<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Mobile Security on Florence Njeri</title><link>https://florence-njeri.github.io/njeri/tags/mobile-security/</link><description>Recent content in Mobile Security on Florence Njeri</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Sun, 01 Mar 2026 09:00:00 +0000</lastBuildDate><atom:link href="https://florence-njeri.github.io/njeri/tags/mobile-security/index.xml" rel="self" type="application/rss+xml"/><item><title>8ksec - AndroPseudoProtect: Ultimate Device Security</title><link>https://florence-njeri.github.io/njeri/posts/andropseudoprotect/</link><pubDate>Sun, 01 Mar 2026 09:00:00 +0000</pubDate><guid>https://florence-njeri.github.io/njeri/posts/andropseudoprotect/</guid><description>8ksec - AndroPseudoProtect: Ultimate Device Security # Exploiting Exported Components and Bypassing Security By Obscurity Mechanisms # The goal of this exercise was to develop an android application that exploits Android&amp;rsquo;s IPC by disabling AndroPseudoProtect.apk&amp;rsquo;s security functionality.
My initial thought process was that this would likely involve exploiting improperly exposed components. Specifically, if sensitive components are configured with exported=true, an attacker application could potentially access internal functionality via Inter-Process Communication (IPC), manipulate behavior, and bypass security controls. This assumption proved to be correct.
Installing and Running the App # Upon launching the app, the application asks for access to all files.</description></item><item><title>8kSec - Factsdroid WriteUp</title><link>https://florence-njeri.github.io/njeri/posts/factsdroid/</link><pubDate>Wed, 04 Feb 2026 09:00:00 +0000</pubDate><guid>https://florence-njeri.github.io/njeri/posts/factsdroid/</guid><description>GOAL: Intercept network traffic in FactsDroid and view/modify the API requests and responses between FactsDroid and the backend server without statically patching the provided APK. The objective is to successfully implement a Man-in-The-Middle (MITM) attack that allows you to manipulate the facts being displayed to the user, potentially inserting custom content or modifying the retrieved facts before they reach the application.
Upon installing the app using adb install factsdroid.apk, I immediately see this error message when launching the app: In order to bypass the root check, I injected the Frida anti-root script into my APK:
frida -U --codeshare dzonerzy/fridantiroot -f com.</description></item></channel></rss>