Exploiting Android deep links and exported components - Ekoparty Mobile Hacking Space Talk

Поделиться
HTML-код
  • Опубликовано: 26 ноя 2024

Комментарии • 10

  • @christopherortiz4971
    @christopherortiz4971 4 года назад +2

    Thanks for sharing your knowledge :D

  • @yummy2043
    @yummy2043 2 года назад

    Fye video

  • @domaincontroller
    @domaincontroller 2 года назад

    01:00 android studio for proof of concept development 01:32 frida is awsomely epic for dynamic analysis and dynamic runtime analysis 01:53 DB Browser for SQL lite is great for reading databases you find in public storages 01:59 Custom bash script are essential for automating all redudant tasks 02:43 sandboxing 08:32 exploiting activities ruclips.net/video/XZwLaVz4Scw/видео.html

  • @amitgajbhare8819
    @amitgajbhare8819 Год назад

    Thanks for sharing

  • @alexandercarthdez1469
    @alexandercarthdez1469 4 года назад

    Nice talk, thanks for sharing!

  • @StephenOgu
    @StephenOgu 4 года назад

    kudos B3nac

  • @reza_nematii
    @reza_nematii 3 года назад

    Very good

  • @animeshkar4610
    @animeshkar4610 2 года назад

    do you have a Github documentation for the codes? @B3nac Sec?

  • @zzzzzzzzZzZZzzzaZzz
    @zzzzzzzzZzZZzzzaZzz Год назад

    Nice Video mate
    but What u mean by deeplink

  • @haroldhuntergaming9584
    @haroldhuntergaming9584 4 года назад

    Can you exploit in mobile? In android