Wednesday, June 24, 2015
Monday, June 8, 2015
Monday, June 08, 2015 Unknown No comments
In today’s world, new mobile innovations have changed the way we bank, shop, play, and communicate. This increased demand for mobile innovation is placing pressure on organizations and developers to get applications to market, quickly.
Often times this focus on feature functionality rather than application security can result in an app becoming vulnerable to malicious attacks. This lack of mobile application protection provides mobile hackers an entirely new way to exploit applications. Among the most exploitable areas for hackers to target, is the binary code of the mobile application. Binary code is the code you download from a mobile app store and is what the machine reads to execute an application. There are a number of ways “black hats” seek to exploit binary-based vulnerabilities in order to compromise applications.
Mobile app hacking is easier and faster than ever before. Hackers are utilizing readily available tools to compromise apps in just a matter of minutes. In the videos below, Jonathan Carter from Arxan Technologies, he explains 7 common hacking techniques used to exploit mobile applications.
iTunes Code Encryption BypassSee how easy it is for hackers to bypass iOS encryption to progress a mobile app attack.
Android APK Reverse EngineeringWatch how hackers can easily reverse engineer binary code (the executable) back to source code and primed for code tampering
Algorithm Decompilation and AnalysisSee how “Hopper” is leveraged to initiate a static, springboard attack for counterfeiting and stealing information
Baksmali Code ModificationLearn how hackers can easily crack open and disassemble (Baksmali) mobile code.
Reverse Engineering String Analysis
Watch how hackers use strings analysis as a core element for reverse engineering
Swizzle with Code SubstitutionLearn how hackers leverage infected code to attack critical class methods of an application to intercept API calls and execute unauthorized code, leaving no trace with the code reverting back to original form
Understanding application internal structures and methods via Class DumpsLearn how hackers use this widely available tool to analyze the behavior of an app as a form of reverse engineering and as a springboard to method swizzling
Wednesday, June 3, 2015
Wednesday, June 03, 2015 Unknown No comments
The past few days there's been a lot of buzz about a virus called Chameleon with spreads like common cold, between Wireless Access Points . Chameleon is the product of the University of Liverpool’s School of Computer Science and Electrical Engineering and Electronics and shows for the first time that WiFi networks can be infected with a virus that moves through the air, jumping from access point to access point.
WiFi access points have long been known to be potentially weak spots onto networks, often left unprotected by passwords or encryption, or still using the manufacturer’s or telecoms operator’s default security codes. But up until now, there hasn’t been a virus that could attack a WiFi network.
Chameleon behaves just as a disease would in a viral outbreak, moving faster through cities with dense populations, where access points (and humans) are closer together. The computer scientists simulated its outbreak in Belfast and London and found that in the higher density of London, the connectivity between devices was a more important factor than how susceptible the access points were.
The malware was also able to avoid detection and find the other visible WiFi access points from its current location that were least protected by encryption and passwords.
It propagates in the following sequence:
- It Establish a list of susceptible APs within the range
- Bypass any encryption Security on the targeted AP
- Bypass the administrative interface on the targeted AP
- Identify and Store AP System Settings
- Replace the AP firmware on with the virus-loaded firmware.
- Import the victim original AP System Settings on newly loaded firmware
- Let's Propagate! Back to Step one to next Target.
The Chameleon attack is a serious threat for WiFi network security. The research shows that this kind of attack is undetectable to any Antivirus and Wireless Intrusion Detection System (IDS). However, the virus itself doesn’t exist in the wild and created for the demo purpose in the research lab only, though it is very likely that a malicious version could be created and released into the wild by cyber criminals and malware writers. To know more about the Chameleon you can have a look at the white paper released by the researchers
Sunday, April 5, 2015
Sunday, April 05, 2015 Unknown No comments
The year is 2022, and gamers have lined up on launch day for Sword Art Online, a hotly-anticipated MMORPG that lets players connect to an immersive virtual reality world with special helmets called Nerve Gear. Kirito is one such gamer who's eager to jump back into action, having spent a great deal of time as a beta tester, and quickly becomes friends with newbie warrior Klein. But soon, Sword Art Online's 10,000 players discover that not only are they unable to log out, the only way they can return to their physical bodies is by beating the 100-level tower's final boss - death in the game means death in the real world. Now, with no one else to turn to, Kirito and the other participants must survive the game as best they can.
Saturday, January 3, 2015
Saturday, January 03, 2015 Unknown No comments
KMSpico 9.1.3 is really an amazing tool for activating Office 2013. And as a bonus, you can also activate Windows 8 or 8.1 with this activator. Earlier I shared different activators for Office and Windows. And those activators are working fine. If you can't activate your Office or Windows by those activators, then you can try this one.
I've got Microsoft Office Professional Plus 2013 (final version) last week. And before that I was using Office 2010. After installing Office 2013, I was unable to use it before activating. And with this KMSpico 9.1.3 my Office gets activated within minutes. It's very easy to use!
Furthermore, this KMS is capable of activating -
- Windows 8 and 8.1 (All Versions)
- Windows Vista and 7 (Business, Professional & Enterprise Edition)
- Office 2010 and 2013
- Windows Server 2008/2008R2
- Windows Server 2012/2012R2
- Download the KMSpico 9.1.3 from here. (Only 2.8 MB)
- It's a zip folder. So you have to unzip it first.
- Now double click on KMSpico 9.1.3.exe.
- Press Next > Accept terms > Next > Next > Next > It will be installing now.
- Now go to your Start Menu > Hit on KMSpico.
- It will automatically activate your Office and Windows.
- Click on i button to view your system status as shown below.
- Hit on the Red button to close the KMS window.
What you see in the above image is provided by the KMS. But it doesn't ensure that your Office or Windows is really activated or not.
Now check what your Office 2013 really says about activation -
- Open Microsoft Word 2013
- Hit on the File button from the upper left corner
- Now click on Account and look at the Product information as shown below
If you get this activation status, then there is nothing to worry about. Your Office is activated properly! Enjoy.
Saturday, December 27, 2014
Saturday, December 27, 2014 Unknown No comments