Really Nice Presentation, Gaurang and thank you Aseem for asking so many inquisitive questions 👏👏 Though the current Android version deals with most of these vulnerabilities. But there are still a huge number of handsets running ver
You people ran the exploit app on rooted device to access /data/data folder file which is self accessed to other apps on rooted device .It would be great if u run it on non rooted device
Rooted device is essential for testing purposes so we can open /data/data/ and see if the app save any sensitive info there after that we can exploit the app and it retrieves the sensitive file and save it on the internal storage(public readable)
really a nice and clean stuff thanks for sharing such a valuable knowledge by you 😀
Really Nice Presentation, Gaurang
and thank you Aseem for asking so many inquisitive questions 👏👏
Though the current Android version deals with most of these vulnerabilities. But there are still a huge number of handsets running ver
Thank you 👌
Nice ! more content on android pen-testing
You people ran the exploit app on rooted device to access /data/data folder file which is self accessed to other apps on rooted device .It would be great if u run it on non rooted device
Rooted device is essential for testing purposes so we can open /data/data/ and see if the app save any sensitive info there after that we can exploit the app and it retrieves the sensitive file and save it on the internal storage(public readable)
hi thanks for your best tutorial , learn more about vulnerability of this application (insecure shop ) pls
Nice video, thanks :)
Hey can you make sure to either increase font size or upload in like more higher resolution
we are waiting Next Web resource response bug
Pls add some vedio on Frida tutorial for dynamic analysis of android apps
Sure 😎
Do we expect SSL unpinning with objection in upcoming video of this series?
Yes :D 🙌
I can hear only from left speaker...
Yup I don't know 😕
Oh! Thanks. @Mobile App Pentesting Hack the save the 📱