Android Hacking: Part 2 – Manipulating Apps
In this tutorial we will learn how to modify the source code of an Android app to bypass a password prompt.
Remote (Hack The Box) — Write-up
Mein Write-Up zur Hack The Box Maschine "Remote" [Level: Einfach | Bereiche: CVE, Real Life, Enumeration]
The 5 Steps of every Penetration Test!
When it comes to Hollywood, hacking can sometimes look like magic. Rapid keystrokes, random characters racing across the screen, suddenly the firewall is hacked and the attacker has control over the systems. In reality, there…
36C3 Day 2 – Highlights from the 36th Chaos Communication Congress
A short summary of the best talks, highlights and my experiences of the 2nd day at the 36th Chaos Communication Congress (36C3).
36C3 Day 1 – Highlights from the 36th Chaos Communication Congress
A short summary of the best talks, highlights and my experiences of the 1st day at the 36th Chaos Communication Congress (36C3).
Tr0ll 3 – Please don’t feed the Troll (Walkthrough)
In my writeup for "Tr0ll 3" I will show how the VM fools us several times and explain how to achieve root permissions anyway.
Android Hacking: Part 1 – Decompilation & Source Code
In this tutorial we take a close look on how to recover the source code of an Android app in order to gain access to secret information.
Heartbleed: Your data is just a heartbeat away
The Heartbleed Bug is one of the most notorious software vulnerabilities of all time. Find out how it works and what its repercussions were.