How I Hacked Colorfit pro 4
Colorfit pro 4 (Noisefit) | Reverse Engineering (not a tutorial) Disclaimer: The content provided on this blog regarding the reverse engineering of a smartwatche is intended solely for educat...
Colorfit pro 4 (Noisefit) | Reverse Engineering (not a tutorial) Disclaimer: The content provided on this blog regarding the reverse engineering of a smartwatche is intended solely for educat...
OWASP Uncrackable | Level 3 Introduction After a long time, I’m here again with a next challenge from owasp for Android Uncrackable Level 3. As usual, I’ll begin with the starting point, which is...
OWASP Uncrackable | Level 2 Let’s dive into analyzing the OWASP Uncrackable Level 2 app! Root Detection To understand why, we can decompile the APK using jadx. In the AndroidManifest.xml, the La...
OWASP Uncrackable | Level 1 Let’s dive into analyzing the OWASP Uncrackable Level 1 app! This can be solved in two ways, Using frida (not required here!) Using normal code analysis and write...
Challenge Description A pod’s image holds more than just code. Dive deep into its ECR repository. Inspect the image layers, and uncover the hidden secret. You can also check the required K8s Che...
Challenge: SAW (HTB | Hack the box): 40 points It was an easy but weird challenge. When you install the apk and try to open it, it’s not going to open. Initially I thought there was some permissio...
Challenge: Supermarket (HTB | Hack the box): 40 points It took me just 3-4 minutes for completing this challenge (including decompile, patch the code and recompile). There are multiple ways to so...
How to Use ROP Vulnerability in PicoCTF Ropfu Challenge Here is our challenge where we have to use ROP vulnerability as mentioned in the description. We can start the instance and download the s...
In this tutorial I am going to tell you how I hacked Lenovo Carme smartwatch using Python3 in less than 100 lines of code and with basic knowledge of BLE (Bluetooth Low Energy). This code has bee...