Learning hook is not to attack others and destroy others' application scenarios, but to better protect themselves and make their applications stronger and safer. Obtain...
The central processing unit (CPU) mainly includes registers, arithmetic units and controllers. Controller: Controls the high and low levels of hardware IO ports. Under ARM64,...
Inadvertently in the snow to see a simple CrackMe application, just with this example to summarize the reverse process of the basic common tools used,...
Translation books: ReverseEngineeringforBeginners author: DennisYurichev translator: candy 54.1 introduced as everybody knows, Java has many of the compiler (or JVM bytecode) causes is the JVM
Abstract: This series of articles through the reverse analysis of several versions of BurpLoader, analysis of Burpsuite cracking principle, analysis of Burpsuite authentication system security...
Linear congruence Pseudorandom number Generator This time I'll look at a simple pseudorandom function generator that I mentioned once before in the book. In the...
IPhone 5S Mac Os APP: 57qm5Y2V This article mainly through frida-Trace, fridaHook, LLDB dynamic debugging to complete cracking the corresponding login algorithm.
In this article, we will look at the tweak project in detail, including Logos syntax. 1. Theos application creation When we execute the command nic.pl...
Today I will focus on Theos. Theos is a jailbreak development kit that allows you to create Tweak projects, dynamic Hook third-party programs. GitHub link:...
Logos Official address Logos Official address Overview of common Logos syntax 1. %hook Specifies the name of the class that requires a hook, ending with...
When the APP is decomcompiled, modified, and compiled again, if the flash backoff occurs, it may be because the program itself has signature verification, so...
1. Basic principle of MD5 MD5 is message-digest Algorithm 5 to ensure information consistency. A brief overview of the principle of MD5 is to process...
From Beijing business school after graduation, joined the agriculture industry for many years, in one large state probably spent six years from a line of...
Three white hat online challenge platforms, integrating WEB and binary challenge, show the technology and wisdom of white hat in the field of network security...
The iOS app of the mall provides users with the function of retrieving their password. Users need to retrieve their password through three steps: enter...
Recently, I am studying an iOS application. The iOS application is ipA format, but reverse analysis requires IPA peeling, which also requires jailbreaking of mobile...
Rookie one, weekend idle to have no matter, thinking of some sound reverse analysis research practice hand; When I excitedly started the application with MonkeyDev,...
Aboutme: I have written plug-ins, cracked, and accumulated a long time of reverse analysis on the computer butler. Now I am sorting out the invitation...
Compared with the Android system that can be downloaded from anywhere, there are many hidden dangers in system security, such as pirated software, virus intrusion,...