Assembly Refresher . Shellcode Injection . Exploitation Scenarios . Reverse Engineering . Return Oriented Programming . Advanced Exploitation . Memory Errors . . .
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
📡@hackLabel
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
📡@hackLabel
❤3
https://crackmes.one/ for increase your skills in reverse engineering and hacking.
discord: https://discord.com/invite/2pPV3yq
📡@hackLabel
discord: https://discord.com/invite/2pPV3yq
📡@hackLabel
👍5❤2
This media is not supported in your browser
VIEW IN TELEGRAM
☢️reverse engineering course☢️
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
📡@hackLabel
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
📡@hackLabel
❤3👍3🤡1
This media is not supported in your browser
VIEW IN TELEGRAM
How to create a SIM card dump for reverse engineering
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
📡@hackLabel
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
📡@hackLabel
👍2❤🔥1🔥1😱1
Media is too big
VIEW IN TELEGRAM
Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
📡@hackLabel
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
📡@hackLabel
❤4❤🔥1👍1
The Forensics Wiki is an open source website providing information related to digital forensics. The articles on the website cover a wide range of information from tools used during investigations to papers people and organizations that contribute to the field.
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
• Transitioning Forensics Wiki to GitHub
• Contributions Forensics Wiki on MediaWiki
📡@hackLabel
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
• Transitioning Forensics Wiki to GitHub
• Contributions Forensics Wiki on MediaWiki
📡@hackLabel
❤1👌1
• Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals
• Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
• Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
📡@hackLabel
• Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
• Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
📡@hackLabel
IMSI-catcher
This program shows you IMSI numbers, country, brand and operator of cellphones around you.
/!\ This program was made to understand how GSM network work. Not for bad hacking !
github: https://github.com/Oros42/IMSI-catcher
📡@hackLabel
This program shows you IMSI numbers, country, brand and operator of cellphones around you.
/!\ This program was made to understand how GSM network work. Not for bad hacking !
github: https://github.com/Oros42/IMSI-catcher
📡@hackLabel
❤2🔥1😍1
Get persistent reverse shell from Android app without visible permissions to make device unusable
This blog will introduce you how it is possible to write a persistent reverse shell app on Android without any user requested and visible permissions. Since such application has no permissions, it shouldn't be able to perform any task. Well, that isn't true. We will take a quick look on how Android permissions system works, how it is possible for such permissions-less shell app to execute remote Denial-Of-Service (DoS), list installed apps, reboot device and others. Besides that, I will show you how to identify such established reverse shell connection from your Android device and get rid of it.
https://www.mobile-hacker.com/2023/09/27/get-persistent-reverse-shell-from-android-app-without-visible-permissions-to-make-device-unusable/
📡@hackLabel
This blog will introduce you how it is possible to write a persistent reverse shell app on Android without any user requested and visible permissions. Since such application has no permissions, it shouldn't be able to perform any task. Well, that isn't true. We will take a quick look on how Android permissions system works, how it is possible for such permissions-less shell app to execute remote Denial-Of-Service (DoS), list installed apps, reboot device and others. Besides that, I will show you how to identify such established reverse shell connection from your Android device and get rid of it.
https://www.mobile-hacker.com/2023/09/27/get-persistent-reverse-shell-from-android-app-without-visible-permissions-to-make-device-unusable/
📡@hackLabel
👍2❤1
Mobile Forensics Services
Recovering Data in a Secure, Efficient, & Lawful Manner
Empowering Police & Law Enforcement Agencies with Smart Forensics Services.
https://www.systoolsgroup.com/services/mobile-forensics.html
📡@hackLabel
Recovering Data in a Secure, Efficient, & Lawful Manner
Empowering Police & Law Enforcement Agencies with Smart Forensics Services.
https://www.systoolsgroup.com/services/mobile-forensics.html
📡@hackLabel
Systoolsgroup
Mobile Forensics Services – Cell Phone Investigations by Experts
SysTools Mobile Forensics Services provide the best cell phone forensics & smartphone forensic investigation. We help you extract cell phone data from Android, iOS, & other devices.
XML Security in Java
Java XML security issues and how to address them
• Parsing XML in Java
• XML-related attacks
• Exponential entity expansion
• XML External Entity Injection
• Researching security features
• Are people parsing XML securely in practice?
• Conclusion
blog: https://semgrep.dev/blog/2022/xml-security-in-java/
📡@hackLabel
Java XML security issues and how to address them
• Parsing XML in Java
• XML-related attacks
• Exponential entity expansion
• XML External Entity Injection
• Researching security features
• Are people parsing XML securely in practice?
• Conclusion
blog: https://semgrep.dev/blog/2022/xml-security-in-java/
📡@hackLabel
👍1