Bypass Root Detection and Frida Detection | Android UnCrackable Level 3

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.ย. 2024
  • In this video I solve the OWASP UnCrackable Level 3 challenge. This challenge involved a bit more reverse engineering than the first 2 UnCrackable challenges and required some custom Frida scripting as well.
    Note: This is the second time I uploaded this video. The first time only had audio on one side, and I didn't notice until several hours after it was uploaded. Sorry about that. I'll try not to let it happen again.
    Check out OWASP UnCrackable Level 3 here:
    mas.owasp.org/...
    Check out my new website here:
    corsecure.blog

ความคิดเห็น • 11

  • @ca7986
    @ca7986 9 หลายเดือนก่อน

    Loving this series, keep them coming.

  • @ayushmauryars
    @ayushmauryars 5 หลายเดือนก่อน

    You got my respect man❤

  • @nelly4921
    @nelly4921 8 หลายเดือนก่อน

    thanks for this amazing video💙

  • @elcanaldejgr5499
    @elcanaldejgr5499 ปีที่แล้ว

    thx for fixing audio

  • @logentheranmaratthandavar7978
    @logentheranmaratthandavar7978 11 วันที่ผ่านมา

    What avd spec need to use for pentest?

    • @CorSecure
      @CorSecure  10 วันที่ผ่านมา

      It depends on the app and the specs of your host machine. I would start with whatever the default specs are, and if the emulator is struggling to run the app then increase the specs.

  • @bavla163
    @bavla163 11 หลายเดือนก่อน

    Sir how to remove package name protection

  • @user-cm1nu1co9q
    @user-cm1nu1co9q ปีที่แล้ว

    Amazing

  • @muhammadhuzaifa3751
    @muhammadhuzaifa3751 ปีที่แล้ว

    great bro

  • @muhammadhuzaifa3751
    @muhammadhuzaifa3751 ปีที่แล้ว

    how to use apktool for changing app version payfast app
    this app not work can you help me
    thanks......

  • @G3msFinder
    @G3msFinder ปีที่แล้ว

    That's awesome thanks bro 🤍