Skip to content

Security Grind

EMBRACE THE GRIND

  • Current Page: Home
  • Current Page Parent Blog
  • About
  • Contact
    55
    More

    Dissecting SIM Jacker – Part 4 of 4: Exploitation.

    • January 16, 2020

    In previous articles (part 1, part 2 and part 3) we have setup the foundation for understanding the details of SIMs, SMS, SMS-Submit, SMS-Deliver, SMS-PP Data Download, Over The Air...

    General SIM-Jacker
    0
    More

    Dissecting SIM Jacker – Part 3 of 4: SIM Tester.

    • January 15, 2020

    In previous articles we have discussed the basics of SIMs and SMS as well as the different types of SMS messages such as SMS-Submit, SMS-Submit and Over The Air messages...

    General SIM-Jacker
    0
    More

    Dissecting SIM Jacker – Part 2 of 4: OTA Messages.

    • January 14, 2020

    In part 1 we went through the basics of how SIMs and SMS work, as well as the concepts of SMS-Submit, SMS-Deliver and how to send APDU messages through an...

    General SIM-Jacker
    5
    More

    Dissecting SIM Jacker – Part 1 of 4: SIM & SMS Basics.

    • January 13, 2020

    A few months back, the team from AdaptiveMobile Security published their research about a wide spread SIM vulnerability deemed as SIM Jacker, even though they did not provide many details...

    General SIM-Jacker
    3
    More

    Exploiting Android Components: Loading arbitrary URLs in a Webview.

    • September 4, 2019

    On Android applications, Webviews can be leveraged to load web content within an activity, they can be used for loading both static and dynamic content depending on what’s needed. Content...

    Android Pentesting
    9
    More

    Dumping Android application memory with fridump

    • August 26, 2019

    Say you need to dump an Android application’s memory, for example, to check whether or not sensitive information is kept in memory longer than it needs to be, this is...

    Android Pentesting
    0
    More

    Exploiting Android Components: Abusing Activities.

    • August 12, 2019

    Android components are the building blocks for Android mobile applications; activities, for example, are used for creating the application’s user interface and a rich user experience (every screen in an...

    Android Pentesting
    3
    More

    10 things you must do when Pentesting Android Applications.

    • March 6, 2019

    Mobile applications are no doubt an important part of our lives nowadays. More and more, users want to have everything within arm’s reach and service providers are turning to mobile...

    Android Pentesting
    14
    More

    SSL pinning bypass with frida-gadget (gadget-injector.py)

    • December 14, 2018

    This article expands on the things you can achieve with the frida framework. It focuses on the usage of frida-gadget to bypass SSL Pinning controls on Android applications. Do note that...

    Android Pentesting
    25
    More

    Bypassing Android SSL Pinning with FRIDA

    • November 13, 2018

    As a pentester, you may come into the need of bypassing security controls to be able to provide a more significant evaluation. SSL Pinning is one of the most important...

    Android Pentesting
    • « Previous Page
    • Next Page »

    Top Posts

    • Dissecting SIM Jacker - Part 1 of 4: SIM & SMS Basics.
      Dissecting SIM Jacker - Part 1 of 4: SIM & SMS Basics.
    • Manually inject a meterpreter payload.
      Manually inject a meterpreter payload.
    • Dissecting SIM Jacker - Part 4 of 4: Exploitation.
      Dissecting SIM Jacker - Part 4 of 4: Exploitation.
    • Dumping Android application memory with fridump
      Dumping Android application memory with fridump
    • SSL pinning bypass with frida-gadget (gadget-injector.py)
      SSL pinning bypass with frida-gadget (gadget-injector.py)
    • Dissecting SIM Jacker – Part 2 of 4: OTA Messages.
      Dissecting SIM Jacker – Part 2 of 4: OTA Messages.
    • Dissecting SIM Jacker - Part 3 of 4: SIM Tester.
      Dissecting SIM Jacker - Part 3 of 4: SIM Tester.

    Recent Comments

    • ram on Reverse Engineering a Xamarin Application.
    • Dark404 on Dissecting SIM Jacker – Part 1 of 4: SIM & SMS Basics.
    • OSCE³ and OSEE Study Guide  – jagadee.online on The OSWE in Review.
    • Samira on Dissecting SIM Jacker – Part 4 of 4: Exploitation.
    • Youness on Dissecting SIM Jacker – Part 4 of 4: Exploitation.

    Email

    contact@securitygrind.com

    Security Grind © 2025. All Rights Reserved.

    Powered by WordPress. Theme by Alx.