jukelennings

Results 7 issues of jukelennings

1) SIM fraud for passwordless SMS logins or MFA bypassing 2) Persistence via similar methods by registered an adversary controlled phone number (as opposed to ghost logins)

While reviewing Expensify for a couple example additions to techniques, I noticed this co-pilot functionality. This is essentially a form of delegating access to other users of the application so...

We currently have mostly 1-2 examples for each technique demonstrating it is valid to a minimum of a proof of concept level. Going forwards, the more examples we have the...

Run through all the techniques left to right to find some quick-win references to add where appropriate e.g. relevant blog posts/tools that are specific to the technique that we haven't...