Great post from the Payatu blog: Understanding and Modifying the Hermes Bytecode
payatu.com/blog/underst...
@seanpesce.bsky.social
https://seanpesce.blogspot.com
Great post from the Payatu blog: Understanding and Modifying the Hermes Bytecode
payatu.com/blog/underst...
Exploiting Android Client WebViews with Help from HSTS
seanpesce.blogspot.com/2024/09/expl...
(Repost from my X/Twitter)
We've just updated our URL Validation Bypass Cheat Sheet with a new IP address obfuscator, and new payloads by @seanpesce.bsky.social and @t0xodile.bsky.social. Check out the full details at portswigger.net/research/new...
29.10.2024 14:31 β π 5 π 2 π¬ 0 π 03/3
At the end of the day this isn't super consequential though, because a WebView will default to HTTPS if the domain has HSTS preloading configured (I'd be more concerned about MitM potential resulting from cleartextTrafficPermitted)
2/?
Consider this scenario: you can trick a WebView into opening an arbitrary URL with a string such as "attacker[.]com/?https://victim[.]com"
This normally only works with cleartextTrafficPermitted, because otherwise it will trigger a "plaintext traffic" error.
1/? #Android #appsec trivia tidbit:
Apps with cleartextTrafficPermitted allow easier exploitation of WebView URI confusion vulns because WebViews will default to plaintext HTTP if no protocol is provided to loadUrl(), but normally this results in NET::ERR_CLEARTEXT_NOT_PERMITTED
AWS IoT Core: A Compromised Device Perspective
seanpesce.blogspot.com/2023/11/aws-...