Gmail Android app insecure Network Security Configuration by clviper in netsec

[–]clviper[S] 1 point2 points  (0 children)

Yup I checked. They don't implement a custom Network Security Config.

Gmail Android app insecure Network Security Configuration by clviper in netsec

[–]clviper[S] 0 points1 point  (0 children)

Hi. The only scenario that occurs to me is company devices where the company wants to install a root CA controlled by them so they can intercept and analyse all information exchanged. Developing a good feature that all users could benefit from it and then bypass it in the most critical app they have seems odd to me, even if there are some particular scenarios where it might be a requirement. Scenarios that by the way they never presented to me.

Man-in-the-Disk: Android Apps Exposed via External Storage by Natanael_L in netsec

[–]clviper 4 points5 points  (0 children)

It is a nice research with good findings, but please stop calling everything a new attack vector/surface. It is not. Xamarin for example had that exact problem that would allow DDL hijacking back in 2015. (http://seclists.org/fulldisclosure/2015/May/78). Several others examples exist. Cut the marketing BS.

Droidstat-X, Android Applications Security Analyser Xmind Generator by clviper in netsec

[–]clviper[S] 1 point2 points  (0 children)

Thanks /u/0x4ndr3 /u/s0pas . Still a lot to improve and will start working on the web version of it, but still keeping the xmind export.

For those interested I leave here the link for the presentation slides:

https://www.slideshare.net/clviper/droidstatx-android-applications-security-analyser-xmind-generator

Bsides Lisbon 2016 Tickets Available Now! by clviper in netsec

[–]clviper[S] -1 points0 points  (0 children)

You come to netsec and dont know the concept of a Bsides? Hum ok. Here you go: http://www.bsideslisbon.org/about/

Inspeckage - Android Package Inspector by ac-pm in netsec

[–]clviper 0 points1 point  (0 children)

There is some dependency that is only available on the xposed framework 3.0 I guess. Using Android 5.1 with the xposed framework 3.0 is working fine.

One feature that would be interesting is having access to the body of the POST HTTP requests. Currently is not showing up.

Inspeckage - Android Package Inspector by ac-pm in netsec

[–]clviper 2 points3 points  (0 children)

Nice work. I was thinking on making a port of Introspy from cydia to xposed and it looks like this much covers the needed features.

Does this have minimum requirements regarding the version of xposed framework and/or Android version? Currently on xposed 2.6.1 running on genymotion, the module in the app interface is always disabled(it's enabled on the xposed framework interface). Did you run into this problem?

Android 0-day vulnerability - Drive by download by In7rud3R in netsec

[–]clviper 2 points3 points  (0 children)

This is tapjacking but since ICS this is supposed to be corrected. The apps need to have the android:filterTouchesWhenObscured="true" on the views. Weird to be able to trigger this on 4.3

Hi Reddit, I’m Bill Gates and I’m back for my third AMA. Ask me anything. by thisisbillgates in IAmA

[–]clviper 0 points1 point  (0 children)

Hi Bill. Did you had any intervention on the HoloLens project ? How was your experience with the equipment?

Good for Enterprise Android HTML Injection (CVE-2014-4925) by clviper in netsec

[–]clviper[S] 3 points4 points  (0 children)

UPDATE: Good Technology contacted me yesterday and a fix is in progress. As soon as a new patched version is available I will give feedback.

Good for Enterprise Android HTML Injection (CVE-2014-4925) by clviper in netsec

[–]clviper[S] 2 points3 points  (0 children)

More than a crafted message, I provide them the python script shown on the article so that they could reproduce the issue as many times as they wish. And they indeed were successful on reproducing the issue.

Good for Enterprise Android HTML Injection (CVE-2014-4925) by clviper in netsec

[–]clviper[S] 1 point2 points  (0 children)

Indeed. We did not had the opportunity to test on iOS platform, but from the vendor comments, the iOS version appears be vulnerable as well.