Generate release key hash for facebook adroid studio on mac

broken image
broken image

Arbitrary code execution: native code using JNI, UNIX command, privilege escalation….PIM data modification: add/delete contacts, calendar events….External memory operations: file access on SD card….PIM data leakage: contacts, calendar, SMS, mails, clipboard….Remote connection establishment: socket open call, Bluetooth pairing, APN settings edit….Audio/video flow interception: call recording, video capture….Telephony services abuse: premium SMS sending, phone call composition….Connection interfaces information exfiltration: WiFi credentials, Bluetooth MAC adress….

broken image