Tilden SwansAndroid Quickie: TrustedWallet ImpersonationWho they are impersonating:Nov 10, 2020Nov 10, 2020
Tilden SwansUsing what we built (APK Analysis)In a previous post I made some recommendations for a base build of an Android Analysis VM…let’s put it to workSep 21, 2020Sep 21, 2020
Tilden SwansLet’s build an Android Analysis VMNote: when a lot of people first get into Android sample analysis, they go overboard, and end up overwhelming themselves with a lot of…Sep 19, 2020Sep 19, 2020
Tilden SwansCom-pany-pro_fili_ng (U-S) 101Note: this doesn’t go into full passive or active reconnaissance looking for publicly available data, potentials for phish context, etc —…Aug 21, 2020Aug 21, 2020
Tilden SwansAPK Quickie: MediaPlayer.apkFile Name: MediaPlayer.apk Size: 1.46MB MD5: 4751e8fc217645c0debe01fc426a195d SHA1: 96dda778f85ec20c9f8a9dccb4979059c7d9c6bd SHA256…Jun 23, 2020Jun 23, 2020
Tilden SwansAPK: Impersonating SecurePlusMD5: f2d4985291b4682eaa2a3435101904fd SHA-1: 9e4a2c9536bc90d99f87b089b23be3b012920898 SHA-256…Jun 11, 2020Jun 11, 2020
Tilden SwansMalware Traffic AnalysisI’ve been meaning to get around to doing one of these in a public blog for a bit, so I figured I would pick one of the more involved…Jun 1, 2020Jun 1, 2020
Tilden SwansProfiling Applications using ShodanShodan, along with BinaryEdge and Censys are services that allow researchers to query against data collected via various means (crawlers…May 26, 2020May 26, 2020