<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rohit Sharma</title>
    <description>The latest articles on DEV Community by Rohit Sharma (@r0x5r).</description>
    <link>https://dev.to/r0x5r</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1149252%2Fdc5dff9a-8c61-46d3-95dc-50d7eb20af2a.jpg</url>
      <title>DEV Community: Rohit Sharma</title>
      <link>https://dev.to/r0x5r</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/r0x5r"/>
    <language>en</language>
    <item>
      <title>Step-by-Step Guide to Bypass SSL Pinning with Frida</title>
      <dc:creator>Rohit Sharma</dc:creator>
      <pubDate>Sat, 30 Aug 2025 08:52:38 +0000</pubDate>
      <link>https://dev.to/r0x5r/step-by-step-guide-to-bypass-ssl-pinning-with-frida-3bpl</link>
      <guid>https://dev.to/r0x5r/step-by-step-guide-to-bypass-ssl-pinning-with-frida-3bpl</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhnvppvs5e244mghj40qn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhnvppvs5e244mghj40qn.png" alt=" " width="720" height="267"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;prerequisites&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Rooted Device or Emulator: For Android, you’ll need a rooted device or an emulator. For iOS, a jailbroken device is required.&lt;/li&gt;
&lt;li&gt;Frida: Ensure Frida is installed on your computer and the Frida server is running on your device.&lt;/li&gt;
&lt;li&gt;Frida CodeShare Script: Use the script &lt;code&gt;akabe1/frida-multiple-unpinning&lt;/code&gt; from Frida CodeShare.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;#steps&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Install Frida on Your Computer:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;code&gt;pip install frida-tools&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Download and Start Frida Server on Your Device:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;— Download the appropriate Frida server binary for your device from [Frida releases].&lt;br&gt;
 — Push the Frida server to your device and start it:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;adb push frida-server /data/local/tmp/ &amp;amp;&amp;amp; adb shell “chmod 755 /data/local/tmp/frida-server &amp;amp;&amp;amp; /data/local/tmp/frida-server &amp;amp;"&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify Frida is Working:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;code&gt;frida-ps -U&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This should list the processes running on your device.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Execute the Unpinning Script: Replace &lt;code&gt;packagename&lt;/code&gt; with the package name of the target application.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;code&gt;frida -codeshare akabe1/frida-multiple-unpinning -f packagename -U&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This command does the following:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;— codeshare akabe1/frida-multiple-unpinning&lt;code&gt;loads the SSL pinning bypass script from Frida CodeShare.&lt;br&gt;
&lt;/code&gt;-f packagename&lt;code&gt;starts the target application specified by&lt;/code&gt;packagename`.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If the package name of the application is &lt;code&gt;com.example.app&lt;/code&gt;, the command would be:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;frida -codeshare akabe1/frida-multiple-unpinning -f com.example.app &lt;br&gt;
-U&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Additional Tips&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;-Troubleshooting:&lt;/p&gt;

&lt;p&gt;— Ensure the Frida server is compatible with the Frida client version.&lt;br&gt;
— Verify that your device is properly rooted or jailbroken.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verification:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;— Once the application is started with the SSL pinning bypass script, use a tool like Burp Suite or OWASP ZAP to intercept the HTTPS traffic.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;By following these steps, you can bypass SSL pinning in a target application, allowing you to inspect and manipulate HTTPS traffic during security testing. This method leverages Frida’s powerful dynamic instrumentation capabilities and the shared script from Frida CodeShare to simplify the process.&lt;/p&gt;

&lt;p&gt;For a detailed guide on automating the Frida installation process, check out my other article [Automate Frida Installation].&lt;/p&gt;

&lt;p&gt;I am currently looking for a job . If you have any opportunities or need further assistance, feel free to reach out to me.&lt;/p&gt;

&lt;p&gt;Any query DM ME [&lt;a href="https://www.linkedin.com/in/r0x5r/" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/r0x5r/&lt;/a&gt;]&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Android Security Misconfigurations: Key Findings and Recommendations for Clients</title>
      <dc:creator>Rohit Sharma</dc:creator>
      <pubDate>Sat, 30 Aug 2025 08:37:57 +0000</pubDate>
      <link>https://dev.to/r0x5r/android-security-misconfigurations-key-findings-and-recommendations-for-clients-37fn</link>
      <guid>https://dev.to/r0x5r/android-security-misconfigurations-key-findings-and-recommendations-for-clients-37fn</guid>
      <description>&lt;p&gt;In the world of mobile application security, misconfigurations are one of the most common yet critical vulnerabilities that can expose applications to significant risks. During a recent Vulnerability Assessment and Penetration Testing (VAPT) exercise for an Android application, we identified several security misconfigurations that could potentially compromise the application’s integrity, confidentiality, and availability. Below, we outline these findings and provide actionable recommendations to address them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Application Installed in Root Mode&lt;/strong&gt;&lt;br&gt;
Issue: The application is installed and running in root mode, which grants it elevated privileges. This increases the risk of exploitation, as an attacker could leverage root access to manipulate the application or the underlying system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ensure the application does not require root privileges to function.&lt;br&gt;
Implement checks to detect if the device is rooted and restrict the application from running on rooted devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Use of Basic Authentication&lt;/strong&gt;&lt;br&gt;
Issue: The application is using Basic Authentication with credentials (username and password) encoded in Base64. This method is inherently insecure as the credentials can be easily decoded if intercepted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Replace Basic Authentication with more secure authentication mechanisms such as OAuth 2.0 or Token-Based Authentication.&lt;br&gt;
Ensure all communication is encrypted using HTTPS to prevent interception of sensitive data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Debug Mode Enabled&lt;/strong&gt;&lt;br&gt;
Issue: The application has debug mode enabled in the production build. This can expose sensitive information and allow attackers to gain insights into the application’s internal workings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Disable debug mode in the production build by setting android:debuggable="false" in the AndroidManifest.xml file.&lt;br&gt;
Use tools like ProGuard or R8 to obfuscate the code and make reverse engineering more difficult.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Support for Outdated Android Versions&lt;/strong&gt;&lt;br&gt;
Issue: The application supports installation on older Android versions (below Android 10, API 29) that have multiple unpatched vulnerabilities. These devices no longer receive security updates from Google, making them highly susceptible to attacks.&lt;/p&gt;

&lt;p&gt;Recommendation:&lt;/p&gt;

&lt;p&gt;Set the minimum supported Android version to Android 10 (API 29) or higher to ensure devices receive reasonable security updates.&lt;br&gt;
Inform users about the risks of using outdated Android versions and encourage them to upgrade their devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Lack of Emulator Detection&lt;/strong&gt;&lt;br&gt;
Issue: The application does not implement emulator detection, allowing it to run on emulators. This makes it easier for attackers to analyze and reverse-engineer the application in a controlled environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Implement emulator detection mechanisms to prevent the application from running on emulators.&lt;br&gt;
Use libraries or custom checks to detect common emulator signatures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Vulnerable WebView Configuration&lt;/strong&gt;&lt;br&gt;
Issue: The application’s WebView is configured with setJavaScriptEnabled(true), making it vulnerable to loading malicious URLs or executing arbitrary JavaScript code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Disable JavaScript in WebView unless absolutely necessary.&lt;br&gt;
Validate and sanitize all URLs loaded in WebView to prevent loading malicious content.&lt;br&gt;
Use Content Security Policy (CSP) to restrict the sources of content that can be loaded.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. USB Debugging Enabled&lt;/strong&gt;&lt;br&gt;
Issue: The device is enabled with USB debugging mode, which allows unauthorized access to the device and application data via ADB (Android Debug Bridge).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Educate users to disable USB debugging when not in use.&lt;br&gt;
Implement runtime checks to detect if USB debugging is enabled and alert the user or restrict certain functionalities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Sensitive Data Exposure in Logs&lt;/strong&gt;&lt;br&gt;
Issue: Sensitive data such as credentials, tokens, or personal information is being logged using adb logcat. This data can be accessed by attackers if the device is compromised.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Avoid logging sensitive information in production builds.&lt;br&gt;
Use secure logging mechanisms or disable logging entirely for sensitive operations.&lt;br&gt;
Regularly review and clean up logs to ensure no sensitive data is exposed.&lt;br&gt;
Conclusion&lt;br&gt;
Security misconfigurations are often overlooked but can have severe consequences if left unaddressed. By implementing the recommendations outlined above, you can significantly enhance the security posture of your Android application and protect it from potential threats.&lt;/p&gt;

&lt;p&gt;As a best practice, always conduct regular security assessments and penetration testing to identify and remediate vulnerabilities before they can be exploited. If you need further assistance in securing your application, feel free to reach out to our team for a comprehensive security audit.&lt;/p&gt;

&lt;p&gt;Stay Secure, Stay Vigilant! 🔒&lt;/p&gt;

&lt;p&gt;Any query DM ME [&lt;a href="https://www.linkedin.com/in/r0x5r/" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/r0x5r/&lt;/a&gt;]&lt;/p&gt;

</description>
      <category>security</category>
      <category>android</category>
      <category>ptaas</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
