Android Pentesting Methodology | Redfox Security – Part 1
Android Pentesting Methodology Part 2
#MobileSecurity #AndroidSecurity #Infosec
In this blog, we’ll discuss Android architecture and the different layers of Android architecture. This blog is part 1 of the “Android Pentesting Methodology” series and forms a basis for our upcoming blog.
Before we get into the nitty-gritty of the Android Pentesting Methodology, it’s crucial to understand the inner workings of the Android platform.
Android Pentesting Methodology Part 2
We briefly discussed the Android architecture in part 1 of the "Android Pentesting Methodology" series. In part 2 of the same series, we will explore what APKs are, start reversing Android applications and discuss popular debugging tools.#MobileSecurity #AndroidSecurity #Infosec
Forwarded from Pegasus NSO & other spyware
"CHOICEJACKING: Compromising Mobile Devices through Malicious Chargers like a Decade ago", 2025.| Zenodo
#JuiceJacking #ChoiceJacking #Research #MobileSecurity
1/2
CHOICEJACKING attacks exploit JuiceJacking vulnerabilities on mobile devices, targeting Android and iOS to gain file access or code execution
#JuiceJacking #ChoiceJacking #Research #MobileSecurity
1/2