Mobile phone applications have quickly become a part of our daily lives. To date, there are over 2.6 million applications on the Google Play store alone. In this article we will be looking at reverse engineering Android applications to find hard coded credentials. These credentials, in a real life scenario, would likely be hard coded API keys.
CryptoJacking or ‘drive-by mining’ is an attack vector that became prevalent amongst hackers due to... View Article »