Sniffing Network Traffic on Android
Introduction There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you're already paying for. Usually, this requires setting up an access point on an Android device and connecting to it with the laptop. On some devices ...
Google Hacking with GGGoogleScan
When scraping the Google search engine, we need to be careful so that Google doesn't detect our automated tool as a bot, which will redirect us to a captcha website, where we'll need to enter the captcha in order to continue. We don't want that, since then ...
The Basics of IDA Pro
1. Introduction IDA Pro is the best disassembler in the business. Although it costs a lot, there's still a free version available. I downloaded IDA Pro 6.2 limited edition, which is free but only supports disassembly of x86 and ARM programs. Otherwise, it supports a myriad of other ...
Calling Conventions
Introduction Calling conventions are used by all programs without the user even realizing it. But before saying more about them, we must first make sure we understand what happens when a function gets called. Let's say we have a function named "add" that we'll be calling like this ...
Android and Java Native Interface
Java Native Interface (JNI) JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can also call C/C++ functions using Java code and vice versa ...
Using Sandboxes For Hostile Program Analysis
Sandboxes Introduction If you're reading this article, you have probably heard of a sandbox before. But, in case you haven't, I'll provide a quick explanation of what a sandbox really is. It is a technique which we can use to run a possibly malicious program in a ...
Analysis of Malware Samples with the Immunity Debugger API
Introduction Immunity Debugger is a debugger which is very much like Ollydbg. In this tutorial we'll present the Python API that Immunity Debugger uses for writing the plugins. Ollydbg has its own language for plugin development, while Immunity Debugger uses well known Python programming language, which makes the plugin ...
API Hooking with Microsoft Detours
Introduction Microsoft Detours is a library which we can use to build our own DLL that serves as an API monitor when analyzing the results. The best thing about it is that it doesn't require other frameworks as a dependency. The downside is that only x86 support is available ...
Web Vulnerabilities Explained
Introduction We all know that vulnerabilities in web pages are quite common these days. They range from SQL injections, XSS vulnerabilities, CSRF, etc. In this article we'll provide basic examples of the most common vulnerabilities you'll find in web pages—including and especially WordPress. We'll describe them ...
Wordpress Plugin Vulnerabilities: From a Developer’s Point of View
1. Introduction We all know the prevalence of the WordPress blogging system and its share of vulnerabilities in the core system alone over the years. If not, we can take a look at the cvedetails web page that presents all the vulnerabilities from 2004 to the present. We can see ...