all InfoSec news
Bypassing Log.d() for Credential Extraction: A Frida Script Approach
June 7, 2024, 4:07 p.m. | George Joseph
System Weakness - Medium systemweakness.com
In this blog, I’m going to explore the new version of the Bugbazaar application from Payatu. While exploring the application, I found some interesting code. Let’s take a look.
You can find the BugBazaar applications hereTools used: Jadx-GUI, Frida.
Here we find the hardcoded credentials. They are in an obfuscated format. While going through the entire code, we can see that there are ‘ …
android application applications bio blog bypassing can code credential cybersecurity extraction find found frida gui log mobile security profile reverse engineering script version whoami
More from systemweakness.com / System Weakness - Medium
Introduction to Bash for Cybersecurity
1 day, 20 hours ago |
systemweakness.com
Analyzing a reverse Shell Correlating IOCs
1 day, 20 hours ago |
systemweakness.com
Applied Computer Networks | Static Routing
1 day, 20 hours ago |
systemweakness.com
Granny WriteUp | Remote Buffer Overflow | HackTheBox
1 day, 20 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Information Technology Specialist I: Windows Engineer
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California
Information Technology Specialist I, LACERA: Information Security Engineer
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Vice President, Controls Design & Development-7
@ State Street | Quincy, Massachusetts
Vice President, Controls Design & Development-5
@ State Street | Quincy, Massachusetts
Data Scientist & AI Prompt Engineer
@ Varonis | Israel
Contractor
@ Birlasoft | INDIA - MUMBAI - BIRLASOFT OFFICE, IN