Basto.digital

Cyber Security leicht erklärt

  • Home
  • Posts
  • Tutorials
  • About
  • Contact
  • English
    • German
  • Home
  • Posts
  • Tutorials
  • About
  • Contact
  • English
    • German
Link 1
Posts
Link 2
Tutorials
Link 3
Kontakt
  • Thumbnail Android Hacking
    Uncategorized

    Android Hacking: Part 2 – Manipulating Apps

    In this tutorial we will learn how to modify the source code of an Android app to bypass a password prompt.

  • Thumbnail_Remote
    Writeup

    Remote (Hack The Box) — Write-up

    Mein Write-Up zur Hack The Box Maschine "Remote" [Level: Einfach | Bereiche: CVE, Real Life, Enumeration]

  • Thumbnail_Pentest_Post
    Tutorials

    The 5 Steps of every Penetration Test!

    When it comes to Hollywood, hacking can sometimes look like magic. Rapid keystrokes, random characters racing across the screen, suddenly the firewall is hacked and the attacker has control over the systems. In reality, there…

  • 36C3 Thumbnail
    Events

    36C3 Day 2 – Highlights from the 36th Chaos Communication Congress

    A short summary of the best talks, highlights and my experiences of the 2nd day at the 36th Chaos Communication Congress (36C3).

  • 36C3 Thumbnail
    Events

    36C3 Day 1 – Highlights from the 36th Chaos Communication Congress

    A short summary of the best talks, highlights and my experiences of the 1st day at the 36th Chaos Communication Congress (36C3).

  • Writeup

    Tr0ll 3 – Please don’t feed the Troll (Walkthrough)

    In my writeup for "Tr0ll 3" I will show how the VM fools us several times and explain how to achieve root permissions anyway.

  • Thumbnail Android Hacking
    Tutorials,  Tutorials

    Android Hacking: Part 1 – Decompilation & Source Code

    In this tutorial we take a close look on how to recover the source code of an Android app in order to gain access to secret information.

  • Heartbleed
    IT-Security

    Heartbleed: Your data is just a heartbeat away

    The Heartbleed Bug is one of the most notorious software vulnerabilities of all time. Find out how it works and what its repercussions were.

Sprache

  • English
    • Deutsch

Über mich

Bastian Bauer

In my blog I regularly publish articles and practical tutorials on topics related to IT security. I am a computer scientist and work full time as a security consultant with focus on penetration testing.

Beliebte Beiträge

  • Android Hacking: Part 1 - Decompilation & Source CodeAndroid Hacking: Part 1 – Decompilation &… 20. October 2019
  • Android Hacking: Part 2 – Manipulating AppsAndroid Hacking: Part 2 – Manipulating Apps 6. September 2020
  • The 5 Steps of every Penetration Test!The 5 Steps of every Penetration Test! 3. February 2020

Tags

Android Bash Bunny CCC CTF Event Event HackTheBox Law Metasploit Phishing Social Engineering Software Tutorial Tutorial Vulnerability YouTube YouTube

Info

Basto.digital

  • Home
  • Contact
  • Impressum
  • Privacy Policy

Beliebte Beiträge

  • Android Hacking: Part 1 – Decompilation &…
  • Android Hacking: Part 2 – Manipulating Apps
  • The 5 Steps of every Penetration Test!
  • Tr0ll 3 – Please don’t feed the Troll…
  • Heartbleed: Your data is just a heartbeat away
  • 36C3 Day 1 – Highlights from the 36th Chaos…
  • Remote (Hack The Box) — Write-up
  • 36C3 Day 2 – Highlights from the 36th Chaos…

Folge mir

© 2023 Bastian Bauer
Kopieren der Inhalte mit Quellenangabe erlaubt