|
You are here |
yasoob.me | ||
| | | | |
blog.securityinnovation.com
|
|
| | | | | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps. | |
| | | | |
insinuator.net
|
|
| | | | | This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ... | |
| | | | |
blog.dixitaditya.com
|
|
| | | | | Intercepting and Manipulating client-side AES encrypted traffic in mobile applications having hardcoded Key and IV | |
| | | | |
blog.itsecurityexpert.co.uk
|
|
| | | A UK view on Cyber (IT Security) & Information Security. Covers everything Computer Security from the basics to the advanced | ||