Explore >> Select a destination


You are here

yasoob.me
| | blog.ikuamike.io
10.4 parsecs away

Travel
| | Summary I recently participated in RaziCTF 2020 with team fr344aks and I was able to solve an android challenge that I thought needs a proper writeup. I was able to reverse engineer the provided app and use frida for dynamic analysis for a quick win. Challenge Description: I first installed the app in my genymotion emulator to see the basic functionality. There is a padlock icon constantly changing position on the screen and text at the bottom that says 20000 to break the lock.
| | insinuator.net
11.5 parsecs away

Travel
| | This is a write-up about how to use Frida to dump documents from a process after they have been loaded and decrypted. It's a generic and very effective approach demonstrated on a piece of software from North Korea. Some time ago we received an ISO file which was a dump of a CD-ROM from North Korea. The only information we got was that it included a document viewer and various PDF docume ...
| | blog.securityinnovation.com
10.6 parsecs away

Travel
| | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps.
| | peterkleissner.com
46.9 parsecs away

Travel
|