Mobile

If you found exposed broadcast receiver in android app. Reverse the app and investigate it...it may give you access to private shared pref using object deserialization and may lead to account take over!arrow-up-right

Android tip: wifi passwords are in /data/misc/wifi/wpa_supplicant.confarrow-up-right

#bugbountyarrow-up-right Pro Tip - Android applications can suffer from LFI and stored XSS just by injecting <iframe/src=/etc/hosts> into input fields. Payout: $4,500! 😎👍 pic.twitter.com/JvP4jN8Zhaarrow-up-right— xer0dayz (@xer0dayz) June 24, 2018arrow-up-right

Last updated