How classical attacks reverse engineering apply to Flutter apps, a game cheating case study
🗣Floni
What's a Flutter app?
👤AllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
👤Floni
🎖@malwr
🗣Floni
What's a Flutter app?
👤AllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
👤Floni
🎖@malwr
Guardsquare
How classical attacks apply to Flutter apps | Guardsquare
Are the classical attacks that we see on mobile applications applicable to Flutter apps? Learn more about flutter app security and Frida Flutter.
Decompiling x86 Deep Neural Network Executables
🗣mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
👤WarrantyVoider
🎖@malwr
🗣mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
👤WarrantyVoider
🎖@malwr
GitHub
GitHub - monkbai/DNN-decompiler: BTD - Bin To DNN: A DNN Executables Decompiler
BTD - Bin To DNN: A DNN Executables Decompiler. Contribute to monkbai/DNN-decompiler development by creating an account on GitHub.
IDA Free 8.1 released:
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
🎖@malwr
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
🎖@malwr
👍3
Cybersecurity expert analysis about security vulnerabilities that alters exposed NGINX config files
🗣cheeztoshobo
🎖@malwr
🗣cheeztoshobo
🎖@malwr
Criminal IP
Knowledge Hub | Criminal IP
The Knowledge Hub for Criminal IP users, featuring case studies, webinars, white papers, and videos. Explore and utilize the materials you need.
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
🗣monoimpact
Nice chaining. And I've now a headache after reading it.
👤hinterzimmer
🎖@malwr
🗣monoimpact
Nice chaining. And I've now a headache after reading it.
👤hinterzimmer
🎖@malwr
Sonarsource
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
We discovered multiple vulnerabilities in Checkmk, which can be chained together by an unauthenticated, remote attacker to fully take over a vulnerable server.
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
BlackBerry
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
The threat actor known as RomCom is actively deploying new campaigns aimed at victims in Ukraine and English-speaking regions. The BlackBerry Threat Research and Intelligence Team discovered new campaigns that spoof popular brand-name software packages. The…
👍2
Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Phylum Research | Software Supply Chain Security
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
Last week, our automated risk detection platform alerted us to suspicious activity in dozens of newly published PyPI packages. Here's what we uncovered.
👍3