Dissecting Viber. How to analyze Android apps

Date: 04/02/2025

Once, while being on a job search, I received an interesting test assignment: analyze Viber for Android, find vulnerabilities in it, and exploit them. Using this episode as an example, I will demonstrate you an efficient approach that can be used to analyze real apps and obtain results in a short time. Joking aside: if you go through all the steps described below, you have a good chance to find a 0-day vulnerability in Viber. 😉
Read full article →

GPS spoofing: How to become a satellite

Date: 25/01/2025

Each of us uses satellite navigation to get anywhere outside our backyard. But what if GPS, as of a sudden, stops working and cannot be used to determine your location anymore? This article presents an efficient technique enabling you to fool GPS.
Read full article →

Blindfold game. Manage your Android smartphone via ABD

Date: 02/06/2022

One day I encountered a technical issue: I had to put a phone connected to a single-board Raspberry Pi computer into the USB-tethering mode on boot. To do this, I used Android Debug Bridge (ADB), a handy debugging interface for Android devices. There are several ways to automate the work of apps on an Android smartphone using ADB, and this paper examines one of them.
Read full article →

Controlling Android. Dangerous APIs enable hackers to intercept data and reset smartphone settings

Date: 27/11/2021

In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept notifications, extract text from input fields of other apps, and reset device settings.
Read full article →