How My Rogue Android App Could Monitor & Brute-force Your App’s Sensitive Metadata – Arne Swinnen's Security Blog
Tags
attack-pattern: | Data Brute Force - T1110 |
Common Information
Type | Value |
---|---|
UUID | c46a5fb6-8451-489b-a102-f1600fdaa212 |
Fingerprint | bf328a329e3657c1 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 8, 2016, 6:07 p.m. |
Added to db | Jan. 18, 2023, 10:48 p.m. |
Last updated | Nov. 14, 2024, 7:54 p.m. |
Headline | How My Rogue Android App Could Monitor & Brute-force Your App’s Sensitive Metadata |
Title | How My Rogue Android App Could Monitor & Brute-force Your App’s Sensitive Metadata – Arne Swinnen's Security Blog |
Detected Hints/Tags/Attributes | 25/1/9 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 7 | com.google.android.youtube |
|
Details | Domain | 17 | com.instagram.android |
|
Details | Domain | 138 | java.io |
|
Details | Domain | 52 | android.app |
|
Details | Domain | 3 | biginteger.zero |
|
Details | Domain | 1 | biginteger.one |
|
Details | File | 8 | test.xml |
|
Details | File | 1 | youtube.xml |
|
Details | File | 24 | util.log |