It's Steiner254
It's Steiner254

@Steiner254

25 Tweets 10 reads Dec 02, 2022
Day 1⃣0⃣/2⃣0⃣ -- [Hacking Android & IOS Applications]
➡️ Android & IOS Application Hacking - Detecting & Exploiting Vulnerabilities
➡️ ➰ Below some of the best Tips & References (Feel Free To Share)🧵🧵👇👇
🧵🧵👇👇
#BugBounty
#bugbountytips
#cybersecuritytips
1/n
Complete Android Pentesting Guide
oscp.medium.com
2/n
Android app vulnerability classes
static.googleusercontent.com
3/n
Pentesting iOS Applications
pentesteracademy.com
4/n
Intercept android app traffic in Burp Suite: From root to hack [ULTIMATE GUIDE for bug hunters]
@sam5epi0l/intercept-android-app-traffic-in-burp-suite-from-root-to-hack-ultimate-guide-for-bug-hunters-e24f32738a2a" target="_blank" rel="noopener" onclick="event.stopPropagation()">medium.com
5/n
Android App Penetration Testing 101
youtube.com
6/n
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
youtube.com
7/n
Basics on commands/tools/info on how to assess the security of mobile applications
github.com
8/n
Android Penetration Testing Courses
medium.com
9/n
Android Hacking Tutorials
youtube.com
10/n
Stephen Ogu Tutorials
@StephenOgu/videos" target="_blank" rel="noopener" onclick="event.stopPropagation()">youtube.com
11/n
OWASP Mobile Security Guidelines (ANDROID)
@anusha.vilasagar/owasp-mobile-security-guidelines-android-52a8cc56173" target="_blank" rel="noopener" onclick="event.stopPropagation()">medium.com
12/n
A Discussion with OWASP About Its Mobile Top 10 Best Practices
youtube.com
13/n
OWASP mobile top 10 security risks explained with real world examples
medium.com
14/n
OWASP Top 10 mobile risks: Break down and mobile app development best practices
blog.pradeo.com
15/n
How To Reverse Engineer An Android Application In 3 Easy Steps
medium.com
16/n
Let's Reverse Engineer an Android App!
yasoob.me
17/n
Reverse Engineering & Modifying Android Apps using JADX and Frida
httptoolkit.com
18/n
Understanding Improper Platform Usage
medium.com
19/n
Android Insecure Data Storage
arridae.com
20/n
Insecure Logging
medium.com
21/n
Hard Coding issues
medium.com
22/n
Insecure Communication
proandroiddev.com
23/n
All You Need to Know About Android App Vulnerability: Insecure Authentication
getastra.com
n/n
Practice Makes Perfect!
Stay Ethical & Happy Hacking :)
See you here same time tomorrow!

Loading suggestions...