Explore >> Select a destination


You are here

blog.dixitaditya.com
| | notsosecure.com
4.5 parsecs away

Travel
| | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption.
| | yasoob.me
4.0 parsecs away

Travel
| | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct.
| | www.guardsquare.com
4.1 parsecs away

Travel
| | Learn how attackers exploit Android apps, and how to stop them. Discover the typical attack process and key Android mobile app security strategies.
| | takeonrules.com
51.7 parsecs away

Travel
| Last month I wrote Creating an Emacs Command to Rename Files per Denote File Naming Schema. Ive been using it in a one-off situation. And yesterday I wrote a wrapping function to call in dired. The source code for jf/dired-rename-files-to-denote-schema. (defun jf/dired-rename-files-to-denote-schema () "Rename marked files in `dired-mode'." (interactive) (when (seq-find (lambda (file) (member (file-name-nondirectory file) '("." ".."))) (dired-get-marked-files)) (user-error "Can't rename "." or ".." files"...