Notice
Recent Posts
Recent Comments
Link
| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | 31 |
Tags
- ios
- 웹ide
- 3utools
- m5stack
- 동적분석
- goormide
- 안드로이드동적분석
- Frida
- irunit
- frida서버설정
- 위변조탐지
- reverse shell
- frida-server
- 메모리취약점
- 무료웹ide
- fridump
- checkrain
- IDE
- 무결성검증
- 중요정보검색
- 모바일보안
- goorm
- m5go
- frida설정
- 프록시
- android
- 모바일해킹
- checkra1n
- fowarding
- frida-client
Archives
- Today
- Total
WhiteHat Security
PID Cat OS X 설치 - brew install pidcat 실행 - pidcat com.oprah.bees.android GITHUB (https://github.com/JakeWharton/pidcat) JakeWharton/pidcat Colored logcat script which only shows log entries for a specific application package. - JakeWharton/pidcat github.com
공격 포인트 찾기 dz> run app.package.attacksurface com.nhn.android.search Attack Surface: 14 activities exported 18 broadcast receivers exported 0 content providers exported 7 services exported dz> Content Provider 찾기 dz> run app.provider.finduri com.nhn.android.search Scanning com.nhn.android.search... content://com.nhn.android.search.MarketingInitProvider content://com.nhn.android.search.com.squareup..