Chapter - 1 : Setting up Environment
- 1. Emulator Setup 1
- 2. Emulator Setup 2
- 3. Android Studio Overview
- 4. Exploring Android Studio
- 5. Developing 1st app frontend
- 6. Developing 1st app backend
- 7. Testing via ADB
- 8. Tools installation 1
- 9. Tools installation 2
- 1. Getting our Scope Data
- 2. Reversing Android apk
- 3. Source Code Analysis 1
- 4. Source Code Analysis 2
- 5. Malware Analysis 1
- 6. Malware Analysis 2
Chapter - 3 : Bug - Sensitive Information Disclosure
- 1. About Sensitive Information Disclosure
- 2. Live Hunting for Sensitive Information Disclosure 1
- 3. Live Hunting for Sensitive Information Disclosure 2
- 4. POC Sensitive Information Disclosure 1
- 5. POC Sensitive Information Disclosure 2
- 6. POC Sensitive Information Disclosure 3 (Bounty - $2,500)
Chapter - 4 : Bug - Android Web interface Exploit
- 1. About Android Web interface Exploit
- 2. Source code Analysis for Android Web interface Exploit 1
- 3. Source code Analysis for Android Web interface Exploit 2
- 4. Malware development for Android Web interface Exploit
- 5. Exploiting Android Web interface Bug with our Malware
- 6. Live Hunting for Android Web interface Exploit 1
- 7. Live Hunting for Android Web interface Exploit 2
- 8. POC 1 Android Web interface Exploit (OPPO Android app | Hackerone
Scope)
- 9. POC 2 Android Web interface Exploit (Neteller Android app |
BugCrowd Scope)
- 10. POC 3 Android Web interface Exploit (Moneybookers Android app |
BugCrowd Scope)
- 11. POC 4 Android Web interface Exploit (Skrillpayments Android app |
BugCrowd Scope)
Chapter - 5 : Bug - Android SDK API Exploit
- 1. About Android SDK API Exploit
- 2. Source code Analysis for Android SDK API Exploit 1
- 3. Source code Analysis for Android SDK API Exploit 2
- 4. Malware development for Android SDK API Exploit
- 5. Exploiting Android SDK API Bug with our Malware
- 6. Live Hunting for Android SDK API Exploit 1
- 7. Live Hunting for Android SDK API Exploit 2
- 8. Live Hunting for Android SDK API Exploit 3
- 9. Live Hunting for Android SDK API Exploit with bypassing java
security 4
- 10. POC 1 Android SDK API (Faithfull Android app | BugCrowd Scope)
Chapter - 6 : Bug - Android Activity Exploit
- 1. About Android Activity Exploit
- 2. Source code Android Activity Exploit 1
- 3. Source code Android Activity Exploit 2
- 4. Malware development for Android Activity Exploit
- 5. Exploiting Android Activity Bug with our Malware
- 6. Live Hunting for Android Activity Exploit 1
- 7. Live Hunting for Android Activity Exploit 2
- 8. Malware Development for Face cam hacking without android permission
- 9. Live Bug report writing and submission on BugCrowd
- 10. POC 1 Android Activity Exploit ( Android app | BugCrowd Private
program)
- 11. POC 2 Android Activity Exploit leads to Face cam Hacking ( Android
app | BugCrowd Private program)
Chapter - 7 : Bug - Android App Link Exploit
- 1. About Android App Link Exploit
- 2. Source code Android App Link Exploit 1
- 3. Source code Android App Link Exploit 2
- 4. Live Hunting for Android App Link Exploit 1
- 5. Live Hunting for Android App Link Exploit 2
- 6. Live Hunting for Android App Link Exploit 3
- 7. Live Bug report writing and submission on Twitter Android app
(Hackerone Program)
- 8. POC 1 Android App Link ( Twitter Android app | Hackerone Private
program)
Chapter - 8 : Dynamic Attack Setup
- 1. About Dynamic Attack
- 2. Burp Suite setup for Android
- 3. SSL Unpinning on Any Android Application
- 4. Live Hunting Android Dynamic Bugs 1
- 5. Frida Server Setup
- 6. SSL Bypass via Frida Server 1
- 7. SSL Bypass via Objection 1
- 8. SSL Bypass via Frida Server 2
- 9. SSL Bypass via Frida Server 3
- 10. SSL Bypass via Objection 2
- 11. Root Bypass via Frida
- 12. Root Bypass via Objection
- 13. Live Hunting Android Dynamic Bugs 2
- 12. POC Android Dynamic Bug
Chapter - 9 : Bug - Android DB Exploit
- 1. About Android DB Exploit
- 2. Live Hunting Android DB Exploit 1
- 3. Live Hunting Android DB Exploit 2
- 4. Live Hunting Android DB Exploit 3
- 5. Live Hunting Android DB Exploit 4
- 6. POC Android DB Bug leads to Account Takeover (Indeed Android app |
BugCrowd program)
Chapter - 10 : Bug - Android Insecure Logging
- 1. About Android Insecure Logging Exploit
- 2. Live Hunting for Insecure Logging Exploit 1
- 3. Live Hunting for Insecure Logging Exploit 2
- 4. POC Android Insecure Logging (Transferwise Android app | Bugcrowd
program)
Chapter - 11 : Android Games Hacking & Reverse Engineering
- 1. About Android Games Hacking
- 2. Recon for Game Hacking
- 3. Live Hacking --> Game coins & Gems (PlayStore
App) Not mod apk
Chapter - 12 : Extra Android Bugs POC
- 1. POC 1.6 Billion Data Leaking Google App
- 2. POC Exploited Google Hangout Android App
- 3. POC No Rate Limiting in android app
- 4. POC Weak Password Function in Android app
- 5. POC FB SDK Misconfigured in Android app
Chapter - 13 : iOS Apps Hunting Setups
- 1. About iOS Apps Hunting
- 2. Jail Breaking iOS Device
- 3. Installing Frida Server
- 4. Communicating with Frida
- 5. Burp Suite setup for iOS Device
- 6. SSL Bypass via Frida Server 1(iOS)
- 7. SSH Into iOS
- 8. SSL Bypass iOS 1
- 9. SSL Bypass iOS 2
Chapter - 14 : iOS Apps Hunting
- 1. Recon For iOS Apps Hunting
- 2. Hunting iPhone OS (Apple Scope)
- 3. Account Takeover On iOS App
- 4. POC 1 Account Takeover On iOS App (Glassdoor iOS App | Hackerone
Program)
- 5. POC 2 Account Takeover On iOS App (EERO iOS App | BugCrowd Program)
- 6. POC 3 No Rate Limiting On iOS App (iOS App | BugCrowd Private
Program)
- 7. Exporting IPA
- 8. Live iOS Static Code Analysis 1
- 9. Live iOS Static Code Analysis 2