<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>android on </title>
    <link>https://b1872f9d.camati-site.pages.dev/tags/android/</link>
    <description>Recent content in android on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 28 Mar 2026 15:12:59 -0300</lastBuildDate><atom:link href="https://b1872f9d.camati-site.pages.dev/tags/android/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Case Study 07 - HTB Write-up HookFlare Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-07/</link>
      <pubDate>Sat, 28 Mar 2026 15:12:59 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-07/</guid>
      <description>Introduction In this blog post I will show how I solved the Sherlocks Hijacked challenge in HTB about DFIR1 and mobile malware (android).
The description of the challenge is the following:
A S1rBank client reported unauthorized transactions. The victim received an SMS urging a banking app update via a link, which installed a dormant app mimicking the bank’s official version. Once activated, it stole credentials, bypassed 2FA via SMS interception, and exfiltrated data.</description>
    </item>
    
  </channel>
</rss>
