In the name of Allah, the Most Gracious, the Most Merciful. Description: In short, by copying all of the application sandbox of the active/original whatsapp account...
- From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration
- From 3,99 to 1,650 USD (Part I) – Simple Vertical Privilege Escalation by Changing HTTP Response
- From Recon to Optimizing RCE Results – Simple Story with One of the Biggest ICT Company in the World
- If Allah willed it, will be back soon!
- 5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!)
- CVE-2019–18624 – Illegal Rendered at Download Feature in Several Apps (including Opera Mini) that Lead to Extension Manipulation (with RTLO)
- Race Condition that could Result to RCE – (A story with an App that temporary stored an uploaded file within 2 seconds before moving it to Amazon S3)
HackerOne disclosed a bug submitted by vakzz: https://hackerone.com/reports/986386 - Bounty: $500 #hackerone #bugbounty
Into Android Meterpreter and how the malware launches it
#MobileSecurity #AndroidSecurity by @cryptax
We just bypassed an android MDM with Electromagnetic Fault Injection. Wait... It gets more interesting.... using a gas lighter for only $1.5
Kudos to bandit @marunmagesh for the work! Long live Jugaad!
Our research article "Tesla internal API hacking" is out... Happy Hacking https://www.anquanke.com/post/id/218396 (Google Translate needed)