Paulo Renato

Paulo Renato @exadra37

About: I am a Developer Advocate for Security in Mobile Apps and APIs at approov.io. Another passion is the Elixir programming language that was designed to be concurrent, distributed and fault tolerant.

Location:
Scotland
Joined:
Jul 30, 2017

Paulo Renato
articles - 27 total

Ask me Anything About Certificate Pinning

I am Paulo Renato, a Developer Advocate for Mobile and API Security and author of a series of articles on Mobile and API security.

Learn More 0 2Mar 7 '23

Approov Serverless Reverse Proxy in the AWS API Gateway

Rather than securing an API key, wouldn’t it be better not to have it in the app or at least to make sure that if it is extracted then it can’t be used?

Learn More 4 0Sep 23 '20

Using a Reverse Proxy to Protect Third Party APIs

Don't access Third Party APIs directly from a mobile app. Learn how to do it securely with a Reverse Proxy between the mobile app and the Third Party APIs.

Learn More 12 0Jun 26 '20

How to Protect Against Certificate Pinning Bypassing

"Bypassing certificate pinning is easier than many people think. This article describes how to defend your mobile business against such attacks."

Learn More 8 0Feb 6 '20

Bypassing Certificate Pinning

Learn how to repackage a mobile app in order to make it trust in custom SSL certificates. This will enable us to bypass certificate pinning.

Learn More 11 0Jan 8 '20

Securing HTTPS with Certificate Pinning on Android

Learn what certificate pinning is, when to use it, how to implement it in Android, and how it can prevent a MitM attack.

Learn More 15 0Dec 20 '19

Steal That Api Key With A Man In The Middle Attack

Learn how to setup and run a MitM attack to intercept https traffic in a mobile device under your control, so that you can steal that API key. Finally, you will see at a high level how MitM attacks can be mitigated.

Learn More 50 2Dec 4 '19

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Flaw in Android allows apps to capture video and audio without requiring the necessary permissions.

Learn More 6 0Nov 20 '19

Bypassing GitHub's OAuth flow

Abusing HTTP HEAD request to bypass Github OAuth flow.

Learn More 13 0Nov 14 '19

How to Extract an API Key from a Mobile App by Static Binary Analysis

Discover how easy is to grab an API key by reverse engineering the binary of a mobile app, through the use of an open source tool, even by non-developers.

Learn More 14 2Nov 4 '19

Hackers are using a bug in PHP7 to remotely hijack web servers

A new recently patched remote code execution bug in PHP7 lets hackers hijack the websites running on some NGINX and php-fpm configurations.

Learn More 13 0Oct 28 '19

Why Does Your Mobile App Need An Api Key?

The lesson to be learned here is that releasing a mobile app without a way of identifying itself to the API server is like leaving your car with the doors closed but not locked, and the keys in the ignition.

Learn More 11 2Oct 22 '19

I am a Developer Advocate for Security in Mobile Apps and APIs, Ask Me Anything

Have a question about Mobile API Security? Try me!

Learn More 11 26Oct 16 '19

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

The vulnerability in question is a sudo security policy bypass issue that could allow a malicious user or a program to execute arbitrary commands as root on a targeted Linux system even when the sudoers configuration explicitly disallows the root access.

Learn More 8 1Oct 15 '19

Millions of Phones Leaking Information Via Tor

Researchers claim 30% of all Android devices, and 5% of iOS devices, are transmitting data that could be used to track and profile users

Learn More 8 0Oct 11 '19

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.

Learn More 6 0Oct 8 '19

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

Cyber attackers infected 800,000 users with banking information stealing malware – but mistakes have allowed researchers to look behind the scenes of a successful hacking campaign.

Learn More 7 5Oct 7 '19

The Top 6 Mobile API Protection Techniques - Are They Enough?

Using techniques like Https, API Keys, User Agents, Captchas, IP Blocking and Rate Limiting, User Authentication and Access Tokens may seem more than enough to protect an API, but we will see how they are not enough to stop the API from being abused by bots, hackers or just users with bad intentions.

Learn More 41 0Oct 7 '19

Attackers exploit 0day vulnerability that gives full control of Android phones

Zero day vulnerable phones include 4 Pixel models, devices from Samsung, Motorola, and others.

Learn More 6 2Oct 4 '19

The iOS Checkm8 jailbreak is hugely significant, but not for you

A hacker has revealed an iOS exploit that's unpatchable and could impact millions of iOS devices. But, it's 2019. A jailbreak is only really useful for security researchers. Do you agree?

Learn More 5 0Oct 3 '19

Is your Mobile App Leaking Secrets?

With the increasing use of mobile apps, APIs became popular and mobile app secrets became the way to access the APIs. Putting secrets the source code of mobile apps is a huge cause of concern in terms of security because they can be extracted and reused for unauthorized API access.

Learn More 15 4Oct 2 '19

Android Devices Being Shipped with TCP Port 5555 Enabled

Some Mobile devices are shipped from factory with ADB enabled. Is yours one of them?

Learn More 11 3Oct 2 '18

Browser Based Cyber Threats

Is your browser hacking you? It may be easier than what yout think!!!

Learn More 13 3Sep 28 '18

Containers Under Attack

Learn More 20 9Sep 26 '18

Do you know that DNS queries do not protect your privacy?

Even when using a VPN, like Open VPN you can have DNS leaks, that will allow for example your ISP to know what your are doing.

Learn More 13 1Sep 25 '18

Raising security awareness with a CTF competition... did you already participate in one, how it was?

"CTF or Capture the Flag is a competition aimed to raise awareness around security in an organization of any size."

Learn More 7 0Sep 21 '18

Revenge Hacking Is Hitting the Big Time

Companies are hacking back against cybercriminals to try to prevent—or at least limit the damage of—Equifax-style disasters. One problem: It’s not all that legal.

Learn More 29 4Sep 19 '18