All Questions
40 questions
1
vote
0
answers
248
views
Why was CVE-2022-20411 (Bluetooth Remote Code Execution) not detected by Android's BoundSanitizer?
CVE-2022-20411 enabled remote code execution over Bluetooth on Android. It was fixed in December 2022. But why was it not detected by Android's BoundsSanitizer?
Its purpose is to detect and prevent ...
1
vote
1
answer
364
views
Is it possible to recover data from a bricked smartphone?
I have a smartphone that got bricked last year without warning, and it was deemed unrepairable by multiple repair centers. I did have personal stuff on it.
If I recycle this phone, can someone down ...
1
vote
1
answer
459
views
Received a strange text message. What is it? [closed]
This morning I received the following text message from a Gmail account:
v3s5f3rs4f3gs3.nf5j4k8j4k3o.solar?G$1?V&?KL?O=$HO?&S?K0?$1T
A couple of my friends got it too. I have an iPhone and it ...
1
vote
0
answers
295
views
Does an exploit exist to enable Android debug mode on a locked phone? [closed]
Does someone know an exploit to activate the Android debug mode even if the phone is locked?
I've tried some software to unlock but this is not the way I want to resolve it ...
1
vote
2
answers
165
views
Would a user editable URL be subjected to client vilnerability?
I am working on an android application and the company request is to be able to potentially have a user edit the API URL the app uses to be able to work with different test environments.
This ...
3
votes
3
answers
938
views
How do I protect from a PNG vulnerability on Android?
Lately, poking through my SPAM folder I have found a typical sextortion scam letter. It has a PNG file with letter text attached.
What's interesting it's asking to interact with the image and "copy-...
0
votes
2
answers
2k
views
How to back up and restore personal data safely from possibly exploited android phone?
I'm using a Samsung J7 Prime with Android version 7.0, not rooted.
Recently, I grew suspicious I had become the target of some kind of exploit/network attack/mitm. Since I suspect the exploit is ...
2
votes
1
answer
1k
views
How can I recover my exploited android phone? [closed]
I have a Samsung S9 phone that has been exploited by my neighbor, however I am unsure as to how to prove/verify it, how in depth the access is to my phone, or how I can re-secure my phone.
It seems ...
0
votes
1
answer
472
views
How to response to Meterpreter HTTP Request sent from client
First of all apologies for mistakes as i am at beginner level. I was exploring Meterpreter HTTP Handler. I have created a payload with meterpreter reverse HTTP and writing my own http server for ...
7
votes
1
answer
9k
views
Is it possible for a virus to be embedded in a image and can this image execute on Android Oreo by just opening the image?
I am aware that on Windows this is very much possible. But is it possible on Android (latest OS with all the security updates)? Can you install a virus/malware/spyware by just clicking on an image? ...
1
vote
1
answer
660
views
Tegra X1 bootrom exploit portability potential (K1 in nexus 9 specifically)
I have been wondering if anyone here reckons that porting the recent Tegra X1 bootrom exploit is achievable? The code in question does not seem likely to be going through significant changes ...
3
votes
0
answers
2k
views
Metasploit: Starting paylolad handler... not showing [closed]
I want to hack into my own android device (Wiko Lenny 3 with Android 6.0).
But everytime I press enter after I typed "exploit", it states Exploit running as background job 0 and the message Starting ...
1
vote
0
answers
1k
views
Dirty-COW CVE-2016-5195 not working
I'm working on an Android 4.4.4 device (armeabi-v7a architecture) and I'm testing the SELinux behavior using the Dirty-COW CVE-2016-5195 exploit for escalation priviledge and see what happens. I've ...
5
votes
1
answer
802
views
Is it possible to hack a phone just inputting dialer codes?
I'm currently in Germany, and today a woman asked if she could borrow my phone on the street, as she needed to make an urgent call. The thing is that I lended her my phone and, while I was making sure ...
2
votes
1
answer
258
views
ELF so file got flagged as Exploit, how to confirm if this malicious
VirusTotal is claiming that file contains exploit: https://www.virustotal.com/#/file/31dd9c543e653c0cacfe152f735573e85b49df519c37a32ff76469d0dee6d63b/relations
How to confirm it is not just false ...