Android – Information Security Newspaper | Hacking News https://www.securitynewspaper.com Information Security Newspaper|Infosec Articles|Hacking News Tue, 12 Sep 2023 22:30:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.3 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Android – Information Security Newspaper | Hacking News https://www.securitynewspaper.com 32 32 Exploiting Android App Pin feature to steal money from mobile wallets apps https://www.securitynewspaper.com/2023/09/12/exploiting-android-app-pin-feature-to-steal-money-from-mobile-wallets-apps/ Tue, 12 Sep 2023 22:30:28 +0000 https://www.securitynewspaper.com/?p=27215 An intruder might utilize a security hole in the Android App Pin feature to make illegal purchases using Google Wallet if they are determined enough to do so. Because ofRead More →

The post Exploiting Android App Pin feature to steal money from mobile wallets apps appeared first on Information Security Newspaper | Hacking News.

]]>
An intruder might utilize a security hole in the Android App Pin feature to make illegal purchases using Google Wallet if they are determined enough to do so. Because of the vulnerability, an attacker is able to access the whole card number as well as the expiration date from a device that is locked. To take advantage of the vulnerability identified as CVE-2023-35671, an attacker would need physical access to the device belonging to the victim. After that, they would have to put the gadget in App Pin mode and hold it close to an NFC scanner. After the data from the card has been read, the perpetrator may use it to make an unlawful payment.
Tiziano Marra, an ethical hacker, was the one who discovered the vulnerability. This vulnerability, which has been assigned the identifier CVE-2023-35671, is not your typical security flaw. An information disclosure flaw, sometimes known as a ticking time bomb, is at the core of the issue, and it ultimately results in a logic mistake. What are the possible repercussions? It provides a pernicious capacity to an attacker to gather the whole card number as well as the expiry data of the card.

The Android App Pin feature is where the vulnerability may be accessed once it has already been exploited.Android app pinning was first referred to as’screen pinning’ when it was first introduced with Android 5.0 Lollipop (API level 21) on November 12, 2014. On Android smartphones, this powerful security feature improves the user’s ability to regulate their privacy and protect their data.

Users are given the ability to restrict their mobile device to a single program via the use of a feature known as “app pinning,” which effectively restricts their access to other apps and sensitive data. This capability proved to be quite useful in situations where keeping a highly concentrated work environment, dealing with public terminals, or sharing a device were all necessary requirements. When this is done, it stops unauthorized users from accessing personal data, programs, and settings, which contributes to an overall more secure digital experience.

The following procedures are often included when implementing app pinning as a method of application management:

Users may enable this feature by going to the Settings menu on their smartphone and selecting the Security and Privacy menu followed by the More Security Settings menu and then selecting the App Pinning option. After it has been enabled, users will be able to choose whatever app they want to pin.

Launching the chosen application is the first step in the pinning process, which allows users to enter pinned mode. This operation will permanently lock the device within the user interface of the chosen app.

When using the pinned mode, you won’t be able to interact with any other applications since they will be momentarily hidden from view. If you try to move to another app, access notifications, or perform any other function while the pinned app is open, the device will remind you that you are in the wrong app and keep you there.

Exiting Pinned Mode Users often need to give an extra layer of authentication in order to quit this mode. This may take the form of inputting a pre-set PIN, pattern, or password, or it can be accomplished via the use of biometric recognition (such as fingerprints or face recognition). Because of this additional degree of security, only users who are permitted to do so are able to exit the pinned app environment.

Pinning an Android app has many advantages, including the following:

Pinned mode protects users’ privacy and security by preventing unwanted access to private information, data, and programs that are deemed particularly sensitive.

Public Terminals: App pinning is important in scenarios like kiosks or shared devices since it confines users to a single program, hence decreasing the danger of illegal access and data exposure. This may be accomplished by pinning the application to the home screen of the device.

Focus and Productivity: Users may establish focused work environments by restricting the capabilities of their device to a single application that is task-oriented. This can increase their level of productivity.

Pinning an app to the home screen allows parents to limit their children’s access to just those games and programs that are suitable for their age or those that are instructive.

In a nutshell, Android app pinning, which was formerly referred to as “screen pinning,” was launched with Android 5.0 Lollipop and offers comprehensive control over the functionality and access of the device. It provides increased security, privacy, and focused interaction with digital information by designating a certain app as the one that may be used and needing authentication in order to leave that mode.

There is a logic mistake in the code that makes it possible for a general purpose NFC reader to read the whole card number and expiration data even while the screen on the device is locked. This problem can be found in the HostEmulationManager.java file, which is located in the onHostEmulationData section. This might result in the leaking of local information without the need of any extra execution rights. Exploitation may occur without the participation of the user.

According to Google’s calculations, the severity of this vulnerability is rather high.Along with his discoveries, the hacker was kind enough to submit a proof-of-concept attack, which brought attention to the seriousness of this high-severity vulnerability.

The post Exploiting Android App Pin feature to steal money from mobile wallets apps appeared first on Information Security Newspaper | Hacking News.

]]>
Use your Mobile phone to start Basic Pentesting https://www.securitynewspaper.com/2020/01/08/use-your-mobile-phone-to-start-basic-pentesting/ Wed, 08 Jan 2020 13:15:51 +0000 https://www.securitynewspaper.com/?p=18190 Android, the most popular operating system in mobile. Android gives tons of options from customizing user experience to install apps as per your needs. Some are done by rooting theRead More →

The post Use your Mobile phone to start Basic Pentesting appeared first on Information Security Newspaper | Hacking News.

]]>
Android, the most popular operating system in mobile. Android gives tons of options from customizing user experience to install apps as per your needs. Some are done by rooting the android device & some are available for non-rooting android device. We will show you an android application which gives basic functionality to start pentesting from your mobile phones. This testing involves basic network utilities like: checking the web application destination IP address, trace routing any website, Whois query, dnslookup, netcat & many other features which are mostly required in network/ website basic pentesting. According to ethical hacking researcher of international institute of cyber security network manager can be a handy app for starting very basic pentesting. Now we will show on how to use this app:

  • For testing we will use Xiaomi Redmi Note 4 – Android 7.0 Nougat.
  • Download apk from https://play.google.com/store/apps/details?id=com.eakteam.networkmanager.free&hl=en
  • This apk also comes with paid version. But you can do many task with freeware.
  • Simply download & install network manager apk.
  • Then click on the Network Manager apk.
Home Screen
Home Screen
  • Network Manager APK shows basic IP details.
Network Manager APK
Network Manager APK
  • Network Manager gives tons of features for diagnosing any local network.
Network Manager Features
Network Manager Features
  • Starting with Universal Scanner. This scanner gives options like IP lookup, DNS Lookup, SSL/TLS Analyzer, Ports Scanner, Whois, Trace route.
Network Manager - Universal Scanner
Network Manager – Universal Scanner
  • We have scanned hack.me for showing that how network manager works. For gathering basic info of any website, user can use universal scanner.
  • Such information can be used in information gathering phase of pentesting.
  • Gathering details with whois.
Whois Details
Whois Details
  • Whois is the first step to know any information about any URL. It gives information about website registration details, hosting domain etc.
  • Network manager gives an option to connect using SSH.
  • For testing we have connected with Linux system. For connection, enter the username & password.
SSH-Connection
SSH-Connection
  • Click on connect as you click on connect, it will open terminal session.
SSH-Connection-Established
SSH-Connection-Established
  • SSH can be used for accessing any server from any location.
  • Checking the speedtest with network manager.
Check the speedtest
Check the Speedtest
  • Checking the speedtest before using it gathering information can be helpful.
  • Using the Web Crawler in network manager. This will crawl much information until stopped.
Web-Crawler
Web-Crawler
  • Web crawler which is required for finding bugs in any website. Website crawler shows the all the external, internal links & even shows the images, files & scripts which are found in website crawling.
  • Find the arp cache. This helps to know how many users are connected on the network.
ARP_Cache
ARP_Cache
  • Above shows the connected users with their MAC addresses. Attacker can gather mac addresses from the network. And can be used in ARP-poisoning attacks.
  • Checking the url before opening it on the browser. Network manager
URL Check Safe Browsing
URL Check Safe Browsing
  • Above shows that hackthissite.org is safe to visit. For checking any suspicious URL. Users can use URL check safe browsing.
  • Analyzing SSL – Checking whether URL is secured with SSL or not.
SSL Analyzer
SSL Analyzer
  • Above shows the SSL certificate version with SSL Cipher.
  • Another option is Port scanner, which shows the open ports of the target URL. Certifiedhacker.com is used for testing.
Port Scanner
Port Scanner
  • Above shows the open ports of the certifiedhacker.com. The more ports are open, the more website can be vulnerable.
  • IP calculator can also be used to gives info on how many users can be handled by an network.
IP Calculator
IP Calculator
  • Above screenshot refers 254 are available addresses.

The post Use your Mobile phone to start Basic Pentesting appeared first on Information Security Newspaper | Hacking News.

]]>