Three Ways to Hack Mobile Apps

Поділитися
Вставка
  • Опубліковано 9 жов 2024
  • jh.live/guards... || Protect and defend your own mobile applications with Guardsquare! jh.live/guards...
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricet...
    Learn Coding: jh.live/codecr...
    Don't listen to other "influencer" VPN crap -- host YOUR OWN: jh.live/openvpn
    WATCH MORE:
    Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
    Malware & Hacker Tradecraft: • Malware Analysis & Thr...
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!

КОМЕНТАРІ •

  • @nikolaybarekov2063
    @nikolaybarekov2063 2 дні тому +50

    Conclusion: Do not store sensitive info on the client, doesn't matter if it is a mobile, web or desktop application

    • @ibk2437
      @ibk2437 День тому

      And proper use of API keys

    • @Ne-vc5pm
      @Ne-vc5pm 41 хвилина тому

      Password managers and OTP apps are crying (from laughter) because of your comment

  • @wkgall
    @wkgall 2 дні тому +9

    for a while John H. focused on very niche scenarios on cyber security, I'm glad he is talking about what most devs do assuming that is so common , that all the loop holes are fixed and unexploitable due to it being so mainstream. I'm all ears !

  • @MichealVey1sted
    @MichealVey1sted 2 дні тому +38

    Never realized that all my java app dev would come to use one of these days lmao

    • @x.plorer
      @x.plorer 2 дні тому +1

      these days they use kotlin and frameworks like react and flutter

    • @MichealVey1sted
      @MichealVey1sted 2 дні тому

      @@x.plorer For sure. Why write in two languages (java and swift) the same application when you can just write in one (react native) and have it go to both?

  • @wrathofainz
    @wrathofainz 2 дні тому +5

    Yaaaas. I've done a bit of this stuff, but didn't really get into it (got sidetracked, priorities changed).
    This ought to be enlightening.

  • @LokiCDK
    @LokiCDK 2 дні тому +1

    I've been on hiatus a bit from my studies, but this gets me wanting to start up again.
    I have plans for setting up a new hacking environment soon.
    The plan is to run a hypervisor with a environment templates.
    Thinking for things like this, building containers with all of the tooling so I can just import a container to my RE template when I want to perform "apk-cracking", "hash-cracking", "web-app-cracking" etc.
    Then use git for importing and exporting my nodes and libraries.

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit 2 дні тому +11

    This dude just keeps dropping absolute 🔥❤

  • @MianHizb
    @MianHizb 2 дні тому

    BRO i needed this just one day ago, there is no video that explains like this ,and I had a competition to attend to.

  • @threeMetreJim
    @threeMetreJim 9 годин тому

    Obfuscation tools make it easier for the bad guys too, unfortunately. It can also make developers lazy with regards to security, mistakenly thinking that something can't be cracked. It always will be crackable if you are determined enough.

  • @RealWorldPortal464
    @RealWorldPortal464 День тому

    Bro always loves your videos, can you make a video on hacking apis mainly finding the endpoints are the headaches bro

  • @syedalbaher
    @syedalbaher 2 дні тому +4

    Hey John, just to let you know that you're doing great work here! 🔥🔥🔥

  • @anomalydheryn5492
    @anomalydheryn5492 2 дні тому

    Finally Jhon..!!! episode I've been waiting for..

  • @itshoitshoify
    @itshoitshoify 17 годин тому

    That's some magnificent teaching skills. Thank you

  • @ryd3v
    @ryd3v 2 дні тому +1

    Thumbnail on point

  • @SmilerRyanYT
    @SmilerRyanYT День тому

    Of course this is just an example app, but i would have accepted input, and sent it to a server so it can provide a response for the message box. the app can then stay unprotected since the only thing they can do is brute force the password on the server and of course you can allow only a few attempts per IP if you wanted to secure it even more.

  • @zakyzigzag
    @zakyzigzag День тому

    I just love how the phone has two punch hole front cameras

  • @IrfanAnsari-ng6wb
    @IrfanAnsari-ng6wb 21 годину тому

    Sir, can you please create a bootcamp course for beginners? Please suggest how I can get into cybersecurity.

  • @cyberwarfare-yt1wq
    @cyberwarfare-yt1wq 2 дні тому

    we need more from this videos (mobile and apps)

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 День тому

    Awesome topic. Awesome showcases. Awesome options. Three like 👍👍👍

  • @RajendraShahi-f1x
    @RajendraShahi-f1x 2 дні тому +1

    Always mind-blowing 🎉

  • @azizazizsabek232
    @azizazizsabek232 2 дні тому +1

    Complete this lesson signature Spoofing ❤for us regarding the confusion on the antivirus application ❤❤

  • @dhruvnamdev3357
    @dhruvnamdev3357 2 дні тому

    we want part 2

  • @sassywoocooo
    @sassywoocooo 17 годин тому

    keep it up. i love this content

  • @incurled
    @incurled 2 дні тому

    great video, i've enjoyed the first 15 seconds

  • @randomracer2299
    @randomracer2299 20 годин тому

    00:00:00 00:00:01 00:43:39 00:43:40

  • @P3ntest3r
    @P3ntest3r 2 дні тому +1

    Great video appsec 🎉

  • @nickrosario8442
    @nickrosario8442 День тому

    Can you share the setup for the Pixel enviroment?

  • @choksimega6764
    @choksimega6764 День тому

    Bro help me understand. Can i give you one small file? I already hve password, but our goal would be to bypass psswprd and extract adb commands from the file.. you are authorized to do it dont worry

  • @kenjikakashi
    @kenjikakashi 2 дні тому +2

    Does this work with Flutter Application?

    • @Guardsquare
      @Guardsquare День тому

      Yes! Both the iOS and Android protection solutions support Flutter.

    • @kenjikakashi
      @kenjikakashi День тому

      @Guardsquare yo thanks for commenting, I stumbled on your channel you got great videos.

  • @codingwithebooks
    @codingwithebooks День тому

    why are you using var???

  • @boanproject
    @boanproject 2 дні тому

    thank you!! good information

  • @abdirahmann
    @abdirahmann 2 дні тому

    12:00 there is no way you just pronounced `init` as `aynit`, john that's cursed 😳😳😳😂

  • @not_user11
    @not_user11 2 дні тому

    eyenit

  • @Vietnam35162
    @Vietnam35162 2 дні тому

    Hello

  • @salmon85
    @salmon85 2 дні тому +1

    sup

    • @meiilol
      @meiilol 2 дні тому +3

      the sky

    • @jayy2k5
      @jayy2k5 2 дні тому

      ​@@meiilolroof for me

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 дні тому

    COOL.😃

  • @raihanrafi3665
    @raihanrafi3665 2 дні тому

    Next please analyze spyloan app that haunting indonesian people

  • @magma1034
    @magma1034 2 дні тому

    yay

  • @Balochzadag
    @Balochzadag 2 дні тому

    Guard square 😮

  • @TORGRAIN
    @TORGRAIN 2 дні тому

    6:06 The most obvious and worst way to detect root and debugger
    Wdym by clever way?
    Only the developers who don't care about people exploiting their software would do this method.

    • @Smoth48
      @Smoth48 2 дні тому

      What would be a better way? Asking as a total noob in the field.
      That being said, although this way is obvious, it'll certainly keep the skiddies out, so can you explain what the issue is here?

    • @TORGRAIN
      @TORGRAIN 2 дні тому

      @@Smoth48 this can be easily bypassed
      What I would do is
      Use both native and java/kotlin detection for root and debugging and integrity check
      With obfuscation ofc

    • @meh6244
      @meh6244 2 дні тому

      ​@@Smoth48I'm not sure what method would be better, but this is basically useless as most rooting tools have a "rename this app to avoid detection" toggle.

  • @draxler.a
    @draxler.a 2 дні тому +2

    BS untile now no one made a real android app haking
    this is just veryyyyyy basic shit
    no anti frida detection
    no anti signature verification
    dex encreption ...........MORE.........MORE...............MORE...............
    and when you crack thos tecknique they come with more advance one / modified aproch
    a real app is not that eazy .
    im tired from thos usless content

    • @Mr_Bunneh
      @Mr_Bunneh 2 дні тому

      You're wrong.

    • @codermomo1792
      @codermomo1792 2 дні тому +1

      I did not watch yet, but there is a course at INE about this

    • @TORGRAIN
      @TORGRAIN 2 дні тому +1

      These are all the same shit and they all are useless
      And who would put their api key in client side I mean just lol
      I'm getting into advanced static debugging and modifying protected .lib and I can tell you this content is pretty useless as you said

    • @TORGRAIN
      @TORGRAIN 2 дні тому +1

      ​@@Mr_Bunnehwhy tho?
      I'm distributing paid games and apps on my website
      These contents are utterly useless
      They won't get you anywhere past the very beginning of the reverse engineering

    • @rnts08
      @rnts08 2 дні тому +1

      What do you expect from a glorified script kiddie on UA-cam? You want to learn the nitty gritty? Learn, meet real hackers, not someone who is selling "security" services. Good luck

  • @abdsal96
    @abdsal96 День тому

    Can you hack an online application? Add coins? Applications like (waha: for chatting ) ????

  • @ClintonG56
    @ClintonG56 2 дні тому +2

    Unrelated but can somebody help me get my microsoft account back? The hacker changed my password and deleted all the account information. And he also added his own phone number and authentication app

    • @Dox_N_Drive
      @Dox_N_Drive 2 дні тому +5

      That’s the hacker account now

    • @alexhellings3691
      @alexhellings3691 2 дні тому

      The best you could do would probably be to email Microsoft and tell them your predicament. Best of luck, and I’m sorry this happened. If you can get the account back, make sure to set up 2 factor authentication!

    • @iamvinny
      @iamvinny 2 дні тому +7

      yes, like alex said, go and tell microsoft that you’re pregnant

    • @codermomo1792
      @codermomo1792 День тому +1

      Lol​@@iamvinny