Search:

Type: Posts; User: nishant

Search: Search took 0.01 seconds.

  1. Hi Anant, Sorry for such a late reply. Yes,...

    Hi Anant,

    Sorry for such a late reply. Yes, the twitter options shares the content on twitter, however, it has to be granted access by the user, though.

    Next, as I said, LinkedIn mobile apps...
  2. LinkedIn Mobile Apps Bad Security Architecture: A Case Study

    Breaking News: 1990's programming mistakes repeated in 2012.


    Introduction

    Well the title of the post is self explanatory. It is really sad to see the obvious programming mistakes of the 90's...
  3. Analyzing Different Loops Constructs with IDA [Part - 2]

    Hi,

    This post is in continuation to my 1st post Analyzing Different Loops Constructs with IDA. In this post we shall try to analyse a different kind of loop construct in a compiled binary. All...
  4. Analyzing Different Loops Constructs with IDA

    This post continues from my 1st post here: Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips]

    As the title of the post suggests we shall discuss about analyzing 3 different...
  5. Thanks vinnu for the insight. :) I hope some...

    Thanks vinnu for the insight. :) I hope some people here may still find it useful.
  6. Article: Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips]

    You can view the page at http://www.garage4hackers.com/content.php?r=111-Bloodshed-Dev-C-4.9.9.2-Compiler-Analysis-Reversing-Engineering-Tips
  7. Article: Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips]

    You can view the page at http://www.garage4hackers.com/content.php?r=110-Bloodshed-Dev-C-4.9.9.2-Compiler-Analysis-Reversing-Engineering-Tips
  8. Okay now if we closely analyse all the C source...

    Okay now if we closely analyse all the C source codes and their corresponding ASM files we seem to see a pattern in the generated ASM source codes which pretty much same all the time.

    What we see...
  9. Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips]

    Okay folks,

    This is one idea that came to my mind. Its pretty simple, I'm trying to write some sample programs in a particular compiler, this time it is Bloodshed Dev-C++ 4.9.9.2, and then analyse...
  10. Replies
    4
    Views
    6,872

    Hi Rahul, Thanks for your reply. But question...

    Hi Rahul,

    Thanks for your reply. But question still remains: That in both the cases I have done
    xor eax,eax
    invoke ExitProcess,eax
    end main in the main block (not inside any IF..ELSE or any...
  11. Replies
    4
    Views
    6,872

    Sorry for the poor resolution of images. Better...

    Sorry for the poor resolution of images. Better resolution version are below:

    Image#1 > https://docs.google.com/open?id=0B0HZ_iCLDM1pZmFxd0tDVlNRMktrWGlpMEx4Z1pjdw
    Image#2 >...
  12. Replies
    4
    Views
    6,872

    IDA & MASM Confusions

    Greetings to all,

    I have been trying to brush my ASM skills offlate and started to understand the internals of MASM and IDA. I coded a very simple program with MASM. The code is as follows:

    ...
  13. Issues with XSSer

    Hey punter! That was a nice step-by-step guide to using XSSer.py :) but, mate, I have an issue with it when I want to scan for pages that require authentication specifically form-based...
  14. Replies
    10
    Views
    30,089

    Sticky: MySQL Blind SQL Cheat Sheets

    This is nothing mind blowing but just thought of sharing with you guys. I'll be glad if it can be of any help to you. :)

    Quick & Dirty MySQL (Error Based) Blind SQLi Cheat Sheet

    So, you have a...
Results 1 to 14 of 14