Sergey Toshin
@_bagipro
Followers
7K
Following
185
Media
14
Statuses
143
Ranked as the #1 security researcher for Google Play Security Rewards Program. The founder of @OversecuredInc Android and iOS vulnerability scanners
Joined December 2015
We’re hiring a Mobile App Security Expert! What you'll do: - Research Android/iOS internals and ship new SAST/DAST checks - Turn real-world findings into PoCs and write-ups - Be the technical voice with customers: explain findings, advise architecture, guide CI/CD setup
5
18
155
[4/4] Limitations: 1. The lack of scheme validation 2. You also need to bypass the network security config: - Easy case: usesCleartextTraffic is set to "true" - Hard case: checking the app's network security config and trying to load your own host (or you control DNS responses)
0
0
10
[3/4] This will only work if the scheme isn't validated either. This attack can increase the impact in cases when, e.g., the victim's access token is appended to the request headers
1
0
8
[2/4] You can insert slashes to bypass the host check like this: "bad_dot_com#/://good_dot_com". The default "http" scheme will be used
1
0
5
New Android host validation bypass technique! [1/4] All parsed URIs in Android are https://t.co/x8giXOfU0w.Uri.StringUri objects. However, the scheme parser only looks for the ":" delimiter
5
70
289
🚨 Security Alert: Over 2 billion Android users and 100 million Pixel users may be at risk of file theft, VPN bypass, unauthorized Bluetooth access, and geolocation leaks. Visit our blog for details. https://t.co/AUHBs9E4lp
blog.oversecured.com
9
138
447
We have updated scan reports for all Google phone apps and additionally included reports for Wear OS, Android TV, Android Desktop, and Android Auto! Time to report the vulnerabilities to https://t.co/tSpQhrEQWh!
https://t.co/5QrH20lqq6
blog.oversecured.com
Android bug hunters, your chance to get rewards from Google Only Google has agreed to release the reports without prior fixes. I see dozens of valid bugs (and I submitted 0 of them)
2
9
77
NEW - A whole bunch of fresh Xiaomi vulnerabilities discovered by researchers who say they're serious and all users should update ASAP. https://t.co/7FB6gYTsFH
1
9
23
🔎📱 We found 20 vulnerabilities in Xiaomi apps that could have let someone steal your data. No worries, it's already fixed. To keep your data safe, update your phone. https://t.co/sXXQj41Opr
0
27
57
Android bug hunters, your chance to get rewards from Google Only Google has agreed to release the reports without prior fixes. I see dozens of valid bugs (and I submitted 0 of them)
🖖 Make some coffee and get comfortable. We scanned 224 Google mobile apps for vulnerabilities. The reports have just been published on our website. Enjoy the dive! We'd love to hear your feedback below this post. https://t.co/i63gnHiCXF
#mobilesecurity #oversecuredappscare
1
14
63
[4/4] If you have a physical device whose security you're researching, it's easy to check if permission is declared or not. All you need to do is run the command: adb shell pm list permissions -f | grep com.permission
0
1
12
[3/4] I've already described this bug in the article on permission errors in ecosystem apps ( https://t.co/QBVLQJbYY3), but it turns out that Android vendors often don't do it right either.
1
3
13
[2/4] In my experience, absolutely all vendors, including Google, are prone to this error. Moreover, the list of permissions and protected broadcasts is different for different devices of the same vendor.
1
0
3
[1/4] If you are looking for vulnerabilities in system apps on Android, pay attention to permissions. Very often they are used but not declared anywhere. This allows an attacker to declare and use them.
4
11
93
Introducing MavenGate: A cutting-edge supply chain attack method for Java and Android apps Read more: https://t.co/3BiqJkGTun
#android #maven #gradle #mavengate #securityresearch
blog.oversecured.com
More recently, the cybersecurity community has seen numerous studies of supply chain attacks on Web apps.
2
26
52
📣Oversecured is thrilled to announce our participation in the @Bitrise Mobile DevOps Summit! This is a must-attend event if you're passionate about mobile app development and security. 👉To join us at the event, register on the official website: https://t.co/RxgteJg2RN
1
2
9
For Episode 38 we brought on the legendary mobile hacker @_bagipro for a chat with @0xteknogeek! The mobile attack surface is nearly untapped compared to web, so if you're looking for a new technical challenge then you won't want to miss this one! https://t.co/xFGNvIBD0p
criticalthinkingpodcast.io
Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off wi…
3
21
71
🔒We're excited to announce a significant milestone! Over the past months, our security team has been working closely with @LGMobileGlobal to identify and address dangerous vulnerabilities in their systems You can find detailed updates on the fixes here: https://t.co/DEnDndL0nU
0
3
29
Hello community! We have some exciting updates to share 🚀 1) We're in the process of upgrading our website 2) Our iOS scanner is getting an upgrade, and we're proud to say it's now at least 30% better than before 3) We've expanded our Android scanning rules Stay tuned! #OPU
2
3
26