Sergey Toshin Profile
Sergey Toshin

@_bagipro

Followers
7K
Following
185
Media
14
Statuses
143

Ranked as the #1 security researcher for Google Play Security Rewards Program. The founder of @OversecuredInc Android and iOS vulnerability scanners

Joined December 2015
Don't wanna be here? Send us removal request.
@_bagipro
Sergey Toshin
3 months
Interested? Fill out the form:
0
0
6
@_bagipro
Sergey Toshin
3 months
We’re hiring a Mobile App Security Expert! What you'll do: - Research Android/iOS internals and ship new SAST/DAST checks - Turn real-world findings into PoCs and write-ups - Be the technical voice with customers: explain findings, advise architecture, guide CI/CD setup
5
18
155
@_bagipro
Sergey Toshin
4 months
[4/4] Limitations: 1. The lack of scheme validation 2. You also need to bypass the network security config: - Easy case: usesCleartextTraffic is set to "true" - Hard case: checking the app's network security config and trying to load your own host (or you control DNS responses)
0
0
10
@_bagipro
Sergey Toshin
4 months
[3/4] This will only work if the scheme isn't validated either. This attack can increase the impact in cases when, e.g., the victim's access token is appended to the request headers
1
0
8
@_bagipro
Sergey Toshin
4 months
[2/4] You can insert slashes to bypass the host check like this: "bad_dot_com#/://good_dot_com". The default "http" scheme will be used
1
0
5
@_bagipro
Sergey Toshin
4 months
New Android host validation bypass technique! [1/4] All parsed URIs in Android are https://t.co/x8giXOfU0w.Uri.StringUri objects. However, the scheme parser only looks for the ":" delimiter
5
70
289
@OversecuredInc
Oversecured
1 year
🚨 Security Alert: Over 2 billion Android users and 100 million Pixel users may be at risk of file theft, VPN bypass, unauthorized Bluetooth access, and geolocation leaks. Visit our blog for details. https://t.co/AUHBs9E4lp
Tweet card summary image
blog.oversecured.com
9
138
447
@_bagipro
Sergey Toshin
1 year
We have updated scan reports for all Google phone apps and additionally included reports for Wear OS, Android TV, Android Desktop, and Android Auto! Time to report the vulnerabilities to https://t.co/tSpQhrEQWh! https://t.co/5QrH20lqq6
Tweet card summary image
blog.oversecured.com
@_bagipro
Sergey Toshin
2 years
Android bug hunters, your chance to get rewards from Google Only Google has agreed to release the reports without prior fixes. I see dozens of valid bugs (and I submitted 0 of them)
2
9
77
@iblametom
Thomas Brewster
2 years
NEW - A whole bunch of fresh Xiaomi vulnerabilities discovered by researchers who say they're serious and all users should update ASAP. https://t.co/7FB6gYTsFH
1
9
23
@OversecuredInc
Oversecured
2 years
🔎📱 We found 20 vulnerabilities in Xiaomi apps that could have let someone steal your data. No worries, it's already fixed. To keep your data safe, update your phone. https://t.co/sXXQj41Opr
0
27
57
@_bagipro
Sergey Toshin
2 years
Android bug hunters, your chance to get rewards from Google Only Google has agreed to release the reports without prior fixes. I see dozens of valid bugs (and I submitted 0 of them)
@OversecuredInc
Oversecured
2 years
🖖 Make some coffee and get comfortable. We scanned 224 Google mobile apps for vulnerabilities. The reports have just been published on our website. Enjoy the dive! We'd love to hear your feedback below this post. https://t.co/i63gnHiCXF #mobilesecurity #oversecuredappscare
1
14
63
@_bagipro
Sergey Toshin
2 years
[4/4] If you have a physical device whose security you're researching, it's easy to check if permission is declared or not. All you need to do is run the command: adb shell pm list permissions -f | grep com.permission
0
1
12
@_bagipro
Sergey Toshin
2 years
[3/4] I've already described this bug in the article on permission errors in ecosystem apps ( https://t.co/QBVLQJbYY3), but it turns out that Android vendors often don't do it right either.
1
3
13
@_bagipro
Sergey Toshin
2 years
[2/4] In my experience, absolutely all vendors, including Google, are prone to this error. Moreover, the list of permissions and protected broadcasts is different for different devices of the same vendor.
1
0
3
@_bagipro
Sergey Toshin
2 years
[1/4] If you are looking for vulnerabilities in system apps on Android, pay attention to permissions. Very often they are used but not declared anywhere. This allows an attacker to declare and use them.
4
11
93
@OversecuredInc
Oversecured
2 years
📣Oversecured is thrilled to announce our participation in the @Bitrise Mobile DevOps Summit! This is a must-attend event if you're passionate about mobile app development and security. 👉To join us at the event, register on the official website: https://t.co/RxgteJg2RN
1
2
9
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
2 years
For Episode 38 we brought on the legendary mobile hacker @_bagipro for a chat with @0xteknogeek! The mobile attack surface is nearly untapped compared to web, so if you're looking for a new technical challenge then you won't want to miss this one! https://t.co/xFGNvIBD0p
Tweet card summary image
criticalthinkingpodcast.io
Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off wi…
3
21
71
@OversecuredInc
Oversecured
2 years
🔒We're excited to announce a significant milestone! Over the past months, our security team has been working closely with @LGMobileGlobal to identify and address dangerous vulnerabilities in their systems You can find detailed updates on the fixes here: https://t.co/DEnDndL0nU
0
3
29
@OversecuredInc
Oversecured
2 years
Hello community! We have some exciting updates to share 🚀 1) We're in the process of upgrading our website 2) Our iOS scanner is getting an upgrade, and we're proud to say it's now at least 30% better than before 3) We've expanded our Android scanning rules Stay tuned! #OPU
2
3
26