Skip to content

[0x696E74656E743A2F2F] - The Virtual Meet

Photo of Renato Rodrigues
Hosted By
Renato R.
[0x696E74656E743A2F2F] - The Virtual Meet

Details

[0x696E74656E743A2F2F] - The Virtual Meet

Get ready to embrace the spookiest time of the year with one of our freakiest and bone-chilling adventures yet. We are bringing back to the spotlight an old nightmare that keeps haunting the mobile world. Still clueless? Don't sweat it; you won't be in limbo for long.

Without further ado, we are delighted to announce that in our next gathering, we'll be joined by Inês. If you don't know this talented maverick, you should! She is always ready to help out and geared with a fierce bag full of tricks to hack whatever comes her way; she has been with us for a while and is one of our community's best challenge slayers.

She'll be guiding our path into Deep Links in the Android Platform. Don't worry; we've got you covered if you don't know what we are talking about. This will be a crash course on this endless nightmare from the original problem to attack strategies, mitigations, and how to test it.

This is an adventure your intrepid soul can't pass up. While you wait for the big event, don't be shy and greet @ines on slack.

PS: You can join our Slack chat (https://bit.ly/0xOPOSEC-Slack-I) to discuss all kind of hackish stuff and, of course, interact with other members.

[Goals]

Learn something new, get to know other g33ks, and, the most important thing, have fun.

[Agenda]

  • "Exploiting Deep Links in Android" (PT/EN) by Inês Martins
    Note: And the usual challenge write-up.

[Challenge]

Some vulnerabilities never left us alone! Find the ghost from the past and FLAGs you will get.

URL: http://boo.madlabs.pw

Ping (@)simps0n with the flags and explain your solution, any doubts, shout out in the channel (#ch4llenges).

PS: Keep the fun alive! Please undo any state-changing action so others can play as well :)

Photo of ØxOPOSɆC (In Migration) group
ØxOPOSɆC (In Migration)
See more events