vaidacerto.blogspot.com
VaiDaCerto.blogspot.com: Fevereiro 2014
http://vaidacerto.blogspot.com/2014_02_01_archive.html
Pode ter certeza que tudo vai da certo =]. Compartilhar com o Pinterest. Marcadores: Dicas e truques. Colocando um script python como serviço. Bem pessoal hoje tivemos esta necessidade e vamos registar essa façanha :P. O pré requisito é instalar o um KIT da windows ( Windows Resource Kit. Depois rodar o comando em CMD. SC Create NomeDoServiço binPath= “c: tools svcany.exe”. Vá até HKEY LOCAL MACHINE SYSTEM CurrentControlSet Services. E procure o nome do seu serviço. Em caso de dúvida envie uma mensagem =D.
blog.31mo.com
合法练习黑客技术?这15个网站也许可以帮到你 - 技术客
http://blog.31mo.com/617.html
1 bWAPP - 传送门. 该网站的开发者Malik Messelem @MME IT. 2Damn Vulnerable iOS App DVIA - 传送门. 3Game of Hacks - 传送门. 感兴趣的同学可以关注Game of Hacks的Twitter @gameofhacks. 4Google Gruyere - 传送门. Gruyere中包含多种安全漏洞,从跨站脚本漏洞 XSS 到跨站请求伪造 CSRF ,从信息披露漏洞到DoS和远程代码执行漏洞等等,该网站 应有尽有。 6Hack This Site - 传送门. 7Hellbound Hackers - 传送门. 8McAfee HacMe Sites - 传送门. 12Root Me - 传送门. 发布日期 2016年12月31日 所属分类 网络资讯. 合法练习黑客技术 这15个网站也许可以帮到你 - 技术客.
highaltitudehacks.com
iOS Application Security Part 39 – Sensitive information in memory - Prateek Gianchandani
http://highaltitudehacks.com/2015/03/24/ios-application-security-part-39-sensitive-information-in-memory
IOS Application Security Part 39 Sensitive Information in Memory. Posted by Prateek Gianchandani. We will be solving the Sensitive information in memory challenge in Damn Vulnerable iOS application. Hence, to find the instances of the class SensitiveInformationDetailsVC. Let’s use the choose function with the class name as the argument. As we can see, there is only one reference, and can be accessed using the index 0. To find out all properties, use the command a[0]- isa.messages. Now, you can scan the o...
highaltitudehacks.com
iOS Application Security Part 40 - Testing apps on your Mac - Prateek Gianchandani
http://highaltitudehacks.com/2015/04/28/ios-application-security-part-40-testing-apps-on-your-mac
In this article, we will discuss the …". IOS Application Security Part 40 - Testing Apps on Your Mac. Posted by Prateek Gianchandani. Installing ipa files from iTunes on your simulator. In this case, we are going to perform our testing on Damn Vulnerable iOS app. Analyzing local data storage. IOS 8 - /Users/[username]/Library/Developer/CoreSimulator/Devices/[a unique number]/data/Containers/Data/Application/[another unique number]/. Attaching debuggers and Tracing method calls. You can attach a debugger ...
highaltitudehacks.com
iOS Application Security Part 41 - Debugging applications using LLDB - Prateek Gianchandani
http://highaltitudehacks.com/2015/04/28/ios-application-security-part-41-debugging-applications-using-lldb
IOS Application Security Part 41 - Debugging Applications Using LLDB. Posted by Prateek Gianchandani. In this article we will learn about the LLDB debugger used by Apple’s Xcode for debugging applications, understand why it is better for security testing, and then learn how to use it to debug iOS applications. The following excerpt is from Apple’s documentation. LLDB is Apple’s from the ground up. A good way to start leaning about the LLDB debugger is to watch this video from WWDC 2014. DOCTYPE plist PUB...
highaltitudehacks.com
iOS Application Security Part 44 - Bypassing Jailbreak detection using Xcon - Prateek Gianchandani
http://highaltitudehacks.com/2015/05/23/ios-application-security-part-44-bypassing-jailbreak-detection-using-xcon
IOS Application Security Part 44 - Bypassing Jailbreak Detection Using Xcon. Posted by Prateek Gianchandani. In this small article, we will look at a very handful utility named Xcon. For bypassing Jailbreak detection. As per the wiki page …. A very handful resource for detecting jailbroken devices can be found here. Here is a screenshot from the page. The purpose of Xcon is to make sure all these checks fail. Please note that the current version of Xcon has a lot of issues with iOS 8 and 64 bit devices&#...
highaltitudehacks.com
Prateek Gianchandani
http://highaltitudehacks.com/index.html
Hi I’m Prateek Gianchandani. Security Researcher. Mountaineer. Diver. IOS Application Security Part 46 - App Transport Security. One of the most common misconfiguration issues that i find during testing iOS apps is the bypass of the App Transport Security feature introduced by Apple in iOS 9. Here’s an excerpt from Apple’s documentation about ATS. Read on →. IOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS app version 2.0. Read on →. Read on →. Read on →. In this article, we will lo...
highaltitudehacks.com
iOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS app version 2.0 - Prateek Gianchandani
http://highaltitudehacks.com/2015/05/31/ios-application-security-part-45-enhancements-in-damn-vulnerable-ios-app-version-2-dot-0
IOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS App Version 2.0. Posted by Prateek Gianchandani. In this article, i would like to give a quick walkthrough of the new vulnerabilities and challenges that we have added in version 2.0 of Damn Vulnerable iOS app. In the Insecure Data storage section, we have added challenges for the following databases. We have also added a new section on Extension vulnerabilities. In the Runtime Manipulation section. For his contributions to the project.
highaltitudehacks.com
hire me - Prateek Gianchandani
http://highaltitudehacks.com/hire-me
I am currently available for hire on a contract basis for the following services. Security audit of iOS applications. Security audit of Android applications. Security audit of web applications. Preparing course material for any topic related to mobile/web application security. You can contact me. For any further questions that you may have or download. My resume to know more about me. Theme by Alex Garibay.
SOCIAL ENGAGEMENT