Blog

Home / Blog

Task Hijacking StrandHogg (Pt. 2)

Hello, and welcome back! Hopefully you’ve already gone through Task Hijacking (StrandHogg) Vulnerability Part 1, learning how to identify StrandHogg vulnerabilities. If this is your

Read More »
task hijacking blog

Task Hijacking (StrandHogg), Part1

StrandHogg is an Android vulnerability in which malicious applications exploit its multitasking system to display falsified applications like legitimate ones on devices running Android OS.

Read More »
Dumping Android Application Memory

Dumping Android Application Memory

In today’s digital landscape, protecting sensitive information is of utmost importance. As technology progresses, the tactics used by malicious individuals to illicitly access data also

Read More »
How to Exploit Android Activities?

How to Exploit Android Activities?

This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

Read More »