Greetings friends, it’s been a while since I worked as a penetration tester and my main job is to test mobile applications and my favorite tool is Frida, so I decided to write an article about it. What is Frida? Frida is a dynamic binary instrumentation framework available for multiple… Read more »
Introduction Amass is an open-source reconnaissance tool that helps collect information on a target. It focuses on domain information gathering and network mapping to identify potential vulnerabilities. Amass can be used in various contexts such as cybersecurity research, network security assessment, and business risk management. In this blog, we will… Read more »
Understanding Pithus Mobile Threat Intelligence Tool Pithus Mobile Threat Intelligence Tool is a mobile security solution that offers real-time detection and mitigation of mobile threats. The solution is designed to provide comprehensive mobile threat intelligence that helps organizations identify and address mobile security risks. The solution uses machine learning algorithms… Read more »
What is YARA? YARA is an open-source tool developed by Victor Alvarez that is used to identify and categorize malware based on patterns and rules. It allows security researchers and analysts to create custom rules using a specific syntax to detect specific malware samples. These rules can be based on… Read more »
Introduction The MITRE ATT&CK framework is a comprehensive knowledge base of tactics and techniques used by cyber attackers during various stages of a cyber attack. The framework is maintained by the MITRE Corporation, a not-for-profit organization that operates federally-funded research and development centers (FFRDCs). In this article, we will discuss… Read more »
Introduction The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. Its main mission is to promote innovation and industrial competitiveness in the country by advancing technology, developing standards, and providing technical support to industry, government agencies, and other stakeholders. In… Read more »
Patching an iOS application with Frida involves injecting custom code into the application’s runtime to modify its behavior. Tools like Hopper, Ghidra, and others can typically be used to modify an application’s opcode and patch it but this is another topic. Demo In the upcoming demonstration, we will be patching… Read more »
This blog will demonstrate how to modify an existing application and inject a kind of backend via dylib injection.Dylib injection, also known as library injection, is a technique used in software development and reverse engineering where a dynamic library (dylib) is injected into the address space of a running process.In… Read more »
Disclaimer This article does not give you permission to hack, tamper with, or alter any aspect of the application. I do not accept responsibility for any illicit activity you engage in. The bug was notified to those directly involved via the bugcrowd platform even if the latter did not give… Read more »
Installation on Jailbroken device The first step is to connect to the jb device via ssh after that execute the following commands: mkdir /opt export THEOS=/opt/theos git clone –recursive https://github.com/theos/theos.git $THEOS Download an SDK for your device and place it inside /opt/theos/sdks Hook an iOS app with Theos This demo… Read more »
There is an extension for VSCode called Frida Workbench.This plug-in links VSCode and Frida to provide various conveniences.From the introductory screen, you can see that there are several features, but the code autocomplete feature is the most useful.
As usual, the first step is to perform the static analysis, for this step you can use the tool that you prefer. For this example, we will hook the function $s8SiftDemo14ViewControllerC13checkPassword8passwordSbSS_tF and change its return value. var check = Module.getExportByName(null, “$s8SiftDemo14ViewControllerC13checkPassword8passwordSbSS_tF”)Interceptor.attach(check,{ onLeave(retVal) { return retVal.replace(0x1) }}) Also if the password… Read more »
To get a better understanding of the application, the first step is to perform static analysis. We can use tools such as hopper, ghidra, etc. var isThePasswordCorrect = ObjC.classes.ViewController[“- isThePasswordCorrect:”]Interceptor.attach(isThePasswordCorrect.implementation,{ onEnter: function (args) { var password = new ObjC.Object(args[2]) console.log(“Password submit:” + password.toString()) }, onLeave(retVal){ return retVal.replace(0x1) }}) In the… Read more »
Code signing your app assures users that it’s from a known source and hasn’t been modified since it was last signed. Before your app can integrate app services, be installed on a device, or be submitted to the App Store, it must be signed with a certificate issued by Apple…. Read more »
Alla base del test driven development c’è il concetto che si dovrebbe iniziare scrivendo un test che abbia successo solo quando il codice funziona nel modo desiderato. Può sembrare strano all’inizio, ma ha molto senso: il vostro nuovo test fallirà all’inizio perché il vostro programma non fa la cosa giusta,… Read more »
WWDC22 state of the union prometteva molte migliorie per migliorare i tempi di avvio dell’applicazione. with apps like Lyft or Airbnb launching almost twice as fast thanks to improvement in the dynamic linker. Questo miglioramento deriva dalla velocizzazione dei controlli di protocollo. iOS 16 migliora il tempo di caricamento di… Read more »
Dear friends, today I will show you how to resolve the CyberHeroes challenge tryhackme. Let’s start with a service/port scan Initial scanning nmap -sC -sV -p- -Pn $IP It is evident that there is a web service running on port 80 after some dir busting the only interesting part is… Read more »
Hey everyone, I just wanted to let you know that I passed the OSCP exam with 100 points In just a few words, I would like to share my experience with you Background: Aside from my computer science degree, I also have a number of cyber security certifications, including… Read more »
Service Discovery nmap -sS -sV -sC $IP Since an old version of Redis runs on port 6379, is it possible to use the following exploit to get a reverse shell on the target machine Exploit Redis The first step is to setup a listener handler. It’s possible to use netcat,… Read more »
Hello dear friends and welcome back, today I want to show you how I did resolve the Baby RE from hack the box. The binary is a 64bit ELF and it required to insert the key in a way to get the flag. The next step is to execute the… Read more »
Hello to all, today I wanted to point out a very interesting book that could be of interest to all computer security enthusiasts, the book in question is computer & internet security a hands-on Approach by Wenliang Du. Lately, I have read a lot of interesting books about the cybersecurity… Read more »
Lens e Prism ci consentono di stabilire una sorta di relazione tra strutture dati, in particolare Lens ci consente di focalizzarci e agire su una parte specifica di tale struttura dati come ad esempio effettuando un “set” o un “get” su tale parte della struttura dati. Per definire un Lens… Read more »
Al keynote di WWDC20, Apple ha annunciato iOS 14 con nuove straordinarie funzionalità, tra le tante troviamo i Widget nella schermata principale. Oggi scopriremo come aggiungere widget alla tua app! Innanzitutto, dovrai scaricare alcuni software beta. Tieni presente che si tratta di beta sviluppatore e avrai bisogno di un account… Read more »
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve Input validation vulnerability Part 2 We will use this input point to get some internal file file:////data/data/jakhar.aseem.diva/uinfo-808817149tmp Fanntastic we completed this exercise
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve Insecure Data Storage Part 4. So first of all, we have to store some value For this exercise, we will use jadx and adb So what we will do is to analyze the… Read more »
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve Insecure Data Storage Part 3. So first of all, we have to store some value For this exercise, we will use adb adb devices -l adb connect ipDevice adb shell cd /data/data/jakhar.aseem.diva ls -la… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve Prime:1machine. Description This machine is designed for those one who is trying to prepare for OSCP or OSCP-Exam. This is first level of prime series. Some help at every stage is given. Machine is lengthy as OSCP… Read more »
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve Insecure Data Storage Part 2. For this exercise, we will use adb and db browser for sqlite. So first of all, we have to store some value After that we connected to our virtual… Read more »
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve Insecure Data Storage Part 1. For this exercise, we will use adb, first at all fill the text fields after that connect adb to the device adb connect ip get a shell adb… Read more »
Hello dear friends and welcome back for another Android Diva series blog, today we will resolve HardCoding Issues part 1 For this exercise we will use jadx. Drag and drop the Apk file into Jadx then select HardcodeActivity file and fantastic we found the key vendorsecretkey
Hello dear friends, today we will start a new series based on Android penetration testing. We will go to analyze the diva application. WHAT IS DIVA? DIVA (Damn insecure and vulnerable App) is an App intentionally designed to be insecure. We are releasing the Android version of Diva. We thought… Read more »
Hello, dear friends today I’ll show you how to resolve the CTF Uncrackable – Android Level1. First, we need to install the application in order to understand what it does and how it works adb install UnCrackable-Level1.apk mmm interesting there is a root detection, so now we will use jadx… Read more »
Hello dear friends and welcome back for another mobile security blog, today I’ll show you how to inject frida inside an ipa application. So for todo that we need to install some tools: iOS Deploy brew install node npm install -g ios-deploy If you want to know more about this… Read more »
Hello dear friends, and welcome back for another mobile application security blog, today I’ll show you how to bypass a login form with Frida. For this exercise, I did prepare an easy android Application that you can download from this link. After the download run the app on gennymotion emulator…. Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve hackme: 1machine. Description ‘hackme’ is a beginner difficulty level box. The goal is to gain limited privilege access via web vulnerabilities and subsequently, privilege escalate as root. The lab was created to mimic the real-life environment. ‘hackme’… Read more »
Hello dear friends, and welcome back of another mobile application security blog, on the previous article I did show you how to install Frida on iOS device and how to install frida client, today I’ll show you how to install frida on Android simulator (genymotion). For this example, I use… Read more »
Hello dear friends, today I’ll show you how to “install” frida on iOS device without Jailbreak it, but first of the thing what is frida? Frida it’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps. The first step is… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve DC-3 machine. Description DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. As with the previous DC releases, this one is designed with beginners in mind, although this… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve LazySysAdmin machine. Description Difficulty: Beginner – Intermediate Boot2root created out of frustration from failing my first OSCP exam attempt. Information gathering TCP Scanning Banner Grabbing Nmap scanning Dirb When the samba server is running it’s always a good… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve bulldog machine. Description Bulldog Industries recently had its website defaced and owned by the malicious German Shepherd Hack Team. Could this mean there are more vulnerabilities to exploit? Why don’t you find out? 🙂 This is a standard… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve SP: eric machine. Description Eric is trying to reach out on the Internet, but is he following best practice? Flags – /root/flag.txt – /home/eric/flag.txt Tested with VirtualBox DHCP enabled Difficulty: Beginner Should not be as easy as to… Read more »
Hello dear friends, as all you know I’m very passionate about the cybersecurity and I’m very happy to communicate that iProg, will start a collaboration with Peerlyst. Peerlyst is the Infosec community with the audience of almost 1 million security professionals, in this community you can find many helpful info… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve zico2 machine. Description Zico’s Shop: A Boot2Root Machine intended to simulate a real world cenario Disclaimer: By using this virtual machine, you agree that in no event will I be liable for any loss or damage including… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve Matrix machine. Description Matrix is a medium level boot2root challenge. The OVA has been tested on both VMware and Virtual Box. Difficulty: Intermediate Flags: Your Goal is to get root and read /root/flag.txt Networking: DHCP: Enabled IP… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve Fowsniff machine. Description This is a boot2root machine, It’s a beginner level, but requires more than just an exploitdb search or metasploit to run. It was created in (and is intended to be used with) VirtualBox, and… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve DerpNStink machine Description: Mr. Derp and Uncle Stinky are two system administrators who are starting their own company, DerpNStink. Instead of hiring qualified professionals to build up their IT landscape, they decided to hack together their own… Read more »
Inrtroduzione Redux è un architettura dove tutto lo stato dell’applicazione vive in un container. L’unico modo di cambiare questo stato è di creare un nuovo stato basato sullo stato corrente e richiederne il cambiamento. Andiamo ad esaminare i vari layer: Store gestisce gli stati dell applicazione State determina quale view… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve FristiLeaks. Description A small VM made for a Dutch informal hacker meetup called Fristileaks. Meant to be broken in a few hours without requiring debuggers, reverse engineering, etc.. Information gathering TCP Scanning Analyze the web app After… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve ch4inrulz. Description Frank has a small website and he is a smart developer with a normal security background , he always love to follow patterns , your goal is to discover any critical vulnerabilities and gain access… Read more »
Hello dear friends, welcome back for another CTF Walkthrough. Today we will solve W1R3S. Description You have been hired to do a penetration test on the W1R3S.inc individual server and report all findings. They have asked you to gain root access and find the flag (located in /root directory). Difficulty… Read more »
Si prega di attivare i Javascript! / Please turn on Javascript!
Javaskripta ko calu karem! / Bitte schalten Sie Javascript!
S'il vous plaît activer Javascript! / Por favor, active Javascript!