Skip to content
Primary Menu
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks
  • Pin Posts
  • Pin Posts
Security Queens

Welcome to our Blog!

Mobile

  • Home
  • Blog 🤓
  • Mobile
Category: Android/Mobile/Special Interest/Technical Fundamentals

Android Attack: Malicious APK Walkthrough

Posted On 5 July 20242 July 2024 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 Why Android Attack? Because it sounds like Art Attack and it reminds me of my childhood. Much like the arty thing I used to do back then, in my mind, reversing Android malware is also similar to an art form. Yes things are more “black and white”; Continue Reading

Category: Android/Mobile

Android Attack: Reversing React Native Applications

Posted On 7 October 202217 October 2022 By Sarah8 Comments

Estimated difficulty: 💜💜🤍🤍🤍 This post is going to walk you through how to reverse engineer an Android application that is built using React Native. It is more common to see applications being built using this mobile framework, as it supports the development of an app in both Android and iOS Continue Reading

Category: Android/Mobile/Penetration Testing

MOBster4: Insecure Authentication

Posted On 5 June 202114 October 2021 By Sarahcomment

Estimated difficulty: 💜💜💜💜🤍 We are continuing on our quest to conquer the OWASP Mobile Top 10, and if you have been following this series then congratulations, you have made it to M4: Insecure Authentication! This post is going to delve into the world of how mobile apps can use weak Continue Reading

Category: Mobile

It’s All About Communication, Insecure Communication!

Posted On 2 April 20212 April 2021 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 Welcome back to another MOBster post! It’s part three of our OWASP Mobile Top 10 series and in this post, we are covering M3: Insecure Communication! The previous MOBster post covered M2: Insecure Data Storage, and you can check that out here. Like M2: Insecure Data Storage, Continue Reading

Category: Android/Mobile/Penetration Testing

Liability: Insecure Data Storage

Posted On 5 February 20215 February 2021 By Sarah2 Comments

Estimated difficulty: 💜💜💜🤍🤍 Oh no, it’s another one from the MOBster series coming to get you! Hide… Run… Read with intrigue! This post is covering, M2: Insecure Data Storage, the second listing from the OWASP Top 10 Mobile Risks list. The last post in the MOBster series covered M1: Improper Continue Reading

Category: Android/Mobile/Penetration Testing

What’s that coming over the hill? Is it a MOBster, is it a MOBster!?

Posted On 25 September 202025 September 2020 By Sarahcomment

Estimated difficulty: 💜💜💜💜🤍 Welcome back to the MOBster series! The last post I published, covered the different aspects of an APK file – otherwise known as an app. This post I want to take some of these principles a step further and look at the possible effects of a misconfigured Continue Reading

Category: Android/Mobile/Penetration Testing

What in the APK?!

Posted On 21 August 202021 August 2020 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 This week I wanted to write the first post of a mini mobile application reverse engineering series! There has been a lot of attention in the news about apps such as TikTok and the COVID-19 NHS track and trace app, where they have been shown to have Continue Reading

Category: Mobile

How Does Your Mobile Communicate? The Generation Time Warp!

Posted On 10 July 202010 July 2020 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 In light of recent worries around 5G and its effects on the population (in particular the theory of it causing COVID-19), I thought I would try to demystify the cellular network generations and provide an understanding of how they have developed; in particular, focusing on the security Continue Reading

Load More Posts

Socials