HackDig : Dig high-quality web security articles for hacker

Android Native API Hooking with Library Injection and ELF Introspection.

This post can be considered both the part 2 of the previous "Dynamically inject a shared library into a running process on Android/ARM" and a proof of concept of the same, namely what can be done with library injection on Android. TL;DR I've updated the source code of the arminject project on github adding a library that once injected into a process will
Publish At:2015-05-04 23:30 | Read:3919 | Comments:0 | Tags:hooking api hooking library android injection elf relocation

12 Days of HaXmas: Metasploit, Nexpose, Sonar, and Recog

This post is the tenth in a series, 12 Days of HaXmas, where we take a look at some of more notable advancements and events in the Metasploit Framework over the course of 2014.The Metasploit Framework uses operating system and service fingerprints for automatic target selection and asset identification. This blog post describes a major overhaul of the finger
Publish At:2015-01-04 03:50 | Read:4102 | Comments:0 | Tags:recog fingerprints sonar metasploit nexpose open open-source

Introduction to 4 Open Source CMS

A content management system (CMS is a computer application that allows publishing, editing and modifying content, organizing, deleting as well as maintenance from a central interface. CMS’s are often used to run websites containing blogs, news, and shopping. Many corporate and marketing websites use CMS’s. CMS’s typically aim to avoid the n
Publish At:2014-08-10 17:14 | Read:4766 | Comments:0 | Tags:Articles Reviews CMS concrete5 ghost Joomla octopress open o

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud