|
You are here |
yasoob.me | ||
| | | | |
yepoleb.github.io
|
|
| | | | | [AI summary] This article details the reverse engineering process of the Austrian ID-card verification app to understand its API and encryption methods, aiming for an open-source implementation. | |
| | | | |
www.corellium.com
|
|
| | | | | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering. | |
| | | | |
blog.dixitaditya.com
|
|
| | | | | Intercepting and Manipulating client-side AES encrypted traffic in mobile applications having hardcoded Key and IV | |
| | | | |
www.malwaretech.com
|
|
| | | It seems that the bootstrap code is just scattered around various memory addresses and there's no simple way to dump all of it, so i decided to just dump a chunk of memory from 0x00000000 and look for any reference to addresses outside of that chunk (allowing me to build up a basic map of the code). Although the exact addresses vary between disk models, my layout should give you a good idea where to look. | ||