How classical attacks reverse engineering apply to Flutter apps, a game cheating case study
๐ฃFloni
What's a Flutter app?
๐คAllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
๐คFloni
๐@malwr
๐ฃFloni
What's a Flutter app?
๐คAllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
๐คFloni
๐@malwr
Guardsquare
How classical attacks apply to Flutter apps | Guardsquare
Are the classical attacks that we see on mobile applications applicable to Flutter apps? Learn more about flutter app security and Frida Flutter.
Decompiling x86 Deep Neural Network Executables
๐ฃmttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
๐คWarrantyVoider
๐@malwr
๐ฃmttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
๐คWarrantyVoider
๐@malwr
GitHub
GitHub - monkbai/DNN-decompiler: BTD - Bin To DNN: A DNN Executables Decompiler
BTD - Bin To DNN: A DNN Executables Decompiler. Contribute to monkbai/DNN-decompiler development by creating an account on GitHub.
IDA Free 8.1 released:
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
๐@malwr
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
๐@malwr
๐3
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
Unit 42
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure
Understanding banking Trojan techniques can help detect other activities of financially motivated threat groups.
๐1
Cybersecurity expert analysis about security vulnerabilities that alters exposed NGINX config files
๐ฃcheeztoshobo
๐@malwr
๐ฃcheeztoshobo
๐@malwr
Criminal IP
Knowledge Hub | Criminal IP
The Knowledge Hub for Criminal IP users, featuring case studies, webinars, white papers, and videos. Explore and utilize the materials you need.
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
๐ฃmonoimpact
Nice chaining. And I've now a headache after reading it.
๐คhinterzimmer
๐@malwr
๐ฃmonoimpact
Nice chaining. And I've now a headache after reading it.
๐คhinterzimmer
๐@malwr
Sonarsource
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
We discovered multiple vulnerabilities in Checkmk, which can be chained together by an unauthenticated, remote attacker to fully take over a vulnerable server.
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
BlackBerry
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
The threat actor known as RomCom is actively deploying new campaigns aimed at victims in Ukraine and English-speaking regions. The BlackBerry Threat Research and Intelligence Team discovered new campaigns that spoof popular brand-name software packages. Theโฆ
๐2