Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
1 vote
0 answers
248 views

Why was CVE-2022-20411 (Bluetooth Remote Code Execution) not detected by Android's BoundSanitizer?

CVE-2022-20411 enabled remote code execution over Bluetooth on Android. It was fixed in December 2022. But why was it not detected by Android's BoundsSanitizer? Its purpose is to detect and prevent ...
Finni's user avatar
  • 111
1 vote
1 answer
364 views

Is it possible to recover data from a bricked smartphone?

I have a smartphone that got bricked last year without warning, and it was deemed unrepairable by multiple repair centers. I did have personal stuff on it. If I recycle this phone, can someone down ...
Shubham Deshmukh's user avatar
1 vote
1 answer
459 views

Received a strange text message. What is it? [closed]

This morning I received the following text message from a Gmail account: v3s5f3rs4f3gs3.nf5j4k8j4k3o.solar?G$1?V&?KL?O=$HO?&S?K0?$1T A couple of my friends got it too. I have an iPhone and it ...
Wes Sayeed's user avatar
1 vote
0 answers
295 views

Does an exploit exist to enable Android debug mode on a locked phone? [closed]

Does someone know an exploit to activate the Android debug mode even if the phone is locked? I've tried some software to unlock but this is not the way I want to resolve it ...
Tsuna's user avatar
  • 131
1 vote
2 answers
165 views

Would a user editable URL be subjected to client vilnerability?

I am working on an android application and the company request is to be able to potentially have a user edit the API URL the app uses to be able to work with different test environments. This ...
tyczj's user avatar
  • 113
3 votes
3 answers
938 views

How do I protect from a PNG vulnerability on Android?

Lately, poking through my SPAM folder I have found a typical sextortion scam letter. It has a PNG file with letter text attached. What's interesting it's asking to interact with the image and "copy-...
Boris Treukhov's user avatar
0 votes
2 answers
2k views

How to back up and restore personal data safely from possibly exploited android phone?

I'm using a Samsung J7 Prime with Android version 7.0, not rooted. Recently, I grew suspicious I had become the target of some kind of exploit/network attack/mitm. Since I suspect the exploit is ...
Sabi's user avatar
  • 13
2 votes
1 answer
1k views

How can I recover my exploited android phone? [closed]

I have a Samsung S9 phone that has been exploited by my neighbor, however I am unsure as to how to prove/verify it, how in depth the access is to my phone, or how I can re-secure my phone. It seems ...
VerySeriousSoftwareEndeavours's user avatar
0 votes
1 answer
472 views

How to response to Meterpreter HTTP Request sent from client

First of all apologies for mistakes as i am at beginner level. I was exploring Meterpreter HTTP Handler. I have created a payload with meterpreter reverse HTTP and writing my own http server for ...
Rizwan Ali's user avatar
7 votes
1 answer
9k views

Is it possible for a virus to be embedded in a image and can this image execute on Android Oreo by just opening the image?

I am aware that on Windows this is very much possible. But is it possible on Android (latest OS with all the security updates)? Can you install a virus/malware/spyware by just clicking on an image? ...
Scooby's user avatar
  • 71
1 vote
1 answer
660 views

Tegra X1 bootrom exploit portability potential (K1 in nexus 9 specifically)

I have been wondering if anyone here reckons that porting the recent Tegra X1 bootrom exploit is achievable? The code in question does not seem likely to be going through significant changes ...
nitro's user avatar
  • 11
3 votes
0 answers
2k views

Metasploit: Starting paylolad handler... not showing [closed]

I want to hack into my own android device (Wiko Lenny 3 with Android 6.0). But everytime I press enter after I typed "exploit", it states Exploit running as background job 0 and the message Starting ...
Julius Exile's user avatar
1 vote
0 answers
1k views

Dirty-COW CVE-2016-5195 not working

I'm working on an Android 4.4.4 device (armeabi-v7a architecture) and I'm testing the SELinux behavior using the Dirty-COW CVE-2016-5195 exploit for escalation priviledge and see what happens. I've ...
CRazensuar's user avatar
5 votes
1 answer
802 views

Is it possible to hack a phone just inputting dialer codes?

I'm currently in Germany, and today a woman asked if she could borrow my phone on the street, as she needed to make an urgent call. The thing is that I lended her my phone and, while I was making sure ...
Rotsen's user avatar
  • 51
2 votes
1 answer
258 views

ELF so file got flagged as Exploit, how to confirm if this malicious

VirusTotal is claiming that file contains exploit: https://www.virustotal.com/#/file/31dd9c543e653c0cacfe152f735573e85b49df519c37a32ff76469d0dee6d63b/relations How to confirm it is not just false ...
vmg's user avatar
  • 205

15 30 50 per page