“Day 8: Mobile Hacking — How I Cracked a Banking App’s PIN in 10 Seconds ($5000 Bug)”
作者逆向分析了一款声称使用“军用级加密”的银行应用,发现其在iOS Keychain中明文存储用户PIN码。通过Frida脚本绕过生物识别认证后,成功访问账户并获得5000美元漏洞赏金。 2025-8-12 06:11:37 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

Aman Sharma

Two weeks ago, I reverse-engineered a “secure” banking app that claimed to use “military-grade encryption.” Turns out, they stored user PINs in plaintext in iOS Keychain. With one Frida script, I bypassed biometric auth and accessed any account. The bank paid $5000 after I demonstrated draining test accounts. Here’s the raw technical breakdown — no theory, just what worked.

free link

Press enter or click to view image in full size

“If the app trusts the client, you win.”

Most mobile breaches happen because:

  • Hardcoded secrets (API keys in strings.xml)
  • Insecure local storage (Keychain/SharedPrefs)
  • Lack of certificate pinning (Easy MITM)

Step 1: Downloaded the App

  • Used an Android emulator (Genymotion) for testing
  • Installed the target app from APKMirror (always test older versions — they’re weaker)

Step 2: Ran MobSF for Quick Wins

python3 manage.py runserver  

文章来源: https://infosecwriteups.com/day-8-mobile-hacking-how-i-cracked-a-banking-apps-pin-in-10-seconds-5000-bug-575bd10823cd?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh