Uncrackable - Level 2 | OWASP
OWASP Uncrackable | Level 2 Let’s dive into analyzing the OWASP Uncrackable Level 2 app! Root Detection To understand why, we can decompile the APK using jadx. In the AndroidManifest.xml, the La...
OWASP Uncrackable | Level 2 Let’s dive into analyzing the OWASP Uncrackable Level 2 app! Root Detection To understand why, we can decompile the APK using jadx. In the AndroidManifest.xml, the La...
OWASP Uncrackable | Level 1 Let’s dive into analyzing the OWASP Uncrackable Level 1 app! This can be solved in two ways, Using frida (not required here!) Using normal code analysis and wite ...
Challenge Description A pod’s image holds more than just code. Dive deep into its ECR repository. Inspect the image layers, and uncover the hidden secret. You can also check the required K8s Che...
Challenge: SAW (HTB | Hack the box): 40 points It was an easy but weird challenge. When you install the apk and try to open it, it’s not going to open. Initially I thought there was some permissio...
Challenge: Supermaket (HTB | Hack the box): 40 points It took me just 3-4 minutes for completeing this challange (inlcuding decompile, patch the code and recompile). There are multiple ways to so...
How to Use ROP Vulnerability in PicoCTF Ropfu Challenge Here is our challenge where we have to use ROP vulnerability as mentioned in the description. We can start the instance and download the s...
In this tutorial I am going to tell you how I hacked Lenovo Carme smart watch using Python3 in less than 100 lines of code and with basic knowledge of BLE (Bluetooth Low Energy). This code has be...