Skip to content

Commit c10b680

Browse files
committed
Update bold metacharacter to be consistent with notes2html.
1 parent e021261 commit c10b680

File tree

5 files changed

+51
-12
lines changed

5 files changed

+51
-12
lines changed

androidtesting.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@
1616
Vulnerabilities on the servers.
1717

1818
M1 - Improper platform usage
19-
Miss-configuration in *AndroidManifest.xml*, check *https://developer.android.com/guide/topics/permissions/requesting.html#normal-dangerous*.
20-
If the application uses the fingerprint, test this *https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf*
19+
Miss-configuration in **AndroidManifest.xml**, check **https://developer.android.com/guide/topics/permissions/requesting.html#normal-dangerous**.
20+
If the application uses the fingerprint, test this **https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf**
2121

2222
M2 - Insecure Data storage
2323
Consider XML or SQL injection if the application uses this formats.

mobilesec.txt

+40-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,44 @@
11
*Mobile security*narrative
22

3+
Threats
4+
Apps perform network communication, which can occur through unsecure networks such as cafe wifi.
5+
The phone can be lost or stolen, no app data should be available in the filesystem
6+
Unofficial markets provide malware threats
7+
Big attack surface (NFC, bluetooth, camera, SMS, USB, QR, ...)
8+
9+
Common vulnerabilities
10+
Insecure data storage: data in cleartext, hardcoded keys, or other means that can be reversed engineered.
11+
Insecure transmission of data: not using TLS or implemented incorrectly
12+
Lack of binary protections: No having protections against debugging, tampering, reverse engineering.
13+
Client-side injection: untrusted data in handled in an unsafe manner
14+
Hard-coded passwords: in the app code or data.
15+
Leakage of sensitive data: leaking data through OS or frameworks.
16+
17+
Mobile OWASP top 10
18+
M1 - Improper platform usage
19+
M3 - Insufficient Transport Layer (on server side)
20+
M2 - Insecure Data storage
21+
M4 - Insecure Authentication
22+
M5 - Insufficient Cryptography
23+
M6 - Insecure Authorization
24+
M8 - Code Tampering
25+
M9 -Reverse Engineering
26+
M10 - Extraneous Functionality
27+
28+
29+
Mobile pentest
30+
31+
Static analysis
32+
Use **http://jd.benow.ca/** to decompile to APK classes. Read the code to understand what libraries it uses, how communication is handled and obvious flaws.
33+
34+
Network traffic
35+
Intercept requests using Burp
36+
37+
Data storage
38+
Encrypted?
39+
40+
41+
342
IOS Security
443

544
Secure Boot Chain
@@ -137,7 +176,7 @@ Decompile classes
137176
First get the jar:
138177
*$ sh dex2jar.sh diva-beta.apk
139178
dex2jar diva-beta.apk -> diva-beta_dex2jar.jar*
140-
You can use *JD-GUI* to decompile the classes
179+
You can use **JD-GUI** to decompile the classes
141180

142181
Getting AndroidManifest.xml and smali code
143182
*$ java -jar apktool_2.0.3.jar d diva-beta.apk -o output8*

pentesting.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
*Pentesting*
22
Report
3-
The *executive overview* summarizes the attacks and indicates their potential business impact while suggesting remedies.
4-
The *technical summary* will include a methodological presentation of the technical aspects of the penetration test and is usually read by IT management and staff.
3+
The **executive overview** summarizes the attacks and indicates their potential business impact while suggesting remedies.
4+
The **technical summary** will include a methodological presentation of the technical aspects of the penetration test and is usually read by IT management and staff.
55

66

77
HAProxy upstream proxy load balancing VPN

python.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Use Map reduce to divide CPU intensive tasks:
22
*def get_paths():
33
return []
4-
*def get_inpus():
4+
def get_inpus():
55
return []
66
pool = Pool(4)
77
paths = pool.map(get_paths, get_input())*

sqli.txt

+6-6
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
*SQLI Injection*
22

3-
SQLI
3+
SQLI impact
44
Bypass auth
5-
Leak db
6-
Find passwords, reuse in SSH, etc
7-
MySql: drop a backdoor, read sensitive files
8-
MsSql: code execution
5+
Dump DB
6+
Find passwords, find reuse in SSH, etc
7+
MySql: read sensitive files, write arbitrary files (backdoor).
8+
MsSql: Code execution
99

1010
Testing SQLI
1111
Test error based sending ' " ; and look for errors.
@@ -29,7 +29,7 @@ or 1=1 --
2929
admin' --*
3030

3131
MsSql attacks
32-
Group by + having can be used to specify a search condition for a group and aggregate the result.
32+
Group by and *having* can be used to specify a search condition for a group and aggregate the result.
3333
1. Sending ' having 1=1-- should produce column 'table.column1' is invalid...
3434
2. Sending ' group by table.column1 having 1=1--- should produce: column 'table.column2' is invalid...
3535
3. Sending ' group by table.column1,table.column2 HAVING 1=1-- should end up generating no error when you put all the columns.

0 commit comments

Comments
 (0)