Another day, another post.
In this challenge, we’re going to solve challenge 3 from the CrackMe series.
Watch the below video!
Like my content? Buy me a coffee – http://buymeacoffee.com/thefluffy007
A security researchers' thoughts on cybersecurity education, training, AND hacking ALL THE THINGS: web, mobile, cloud, etc.
Another day, another post.
In this challenge, we’re going to solve challenge 3 from the CrackMe series.
Watch the below video!
Like my content? Buy me a coffee – http://buymeacoffee.com/thefluffy007
Another day, another post.
You, the reader, get a three for one. Three videos in one blog post.
The topics explored are configuring burp for Android Devices. Instead of making this one LONG video, I decided to break it into three videos.
1st video explores downloading the Certificate Authority (root) certificate for Burp
2nd video explores adding the root certificate to our Android emulator using ADB (Android Debug Bridge) and configuring the device and burp to intercept the traffic.
3rd video explores recapping from the beginning what we did to intercept traffic inside an Android device.
I hope you enjoy the content. If you do, please like, subscribe, and share the post and videos!
Without further ado – THE VIDEOS!
Like my content? Buy Me a Coffee! Link here –> https://buymeacoffee.com/thefluffy007
Another day, another challenge.
In today’s post, we’re going to solve CrackMe Challenge 2.
In this challenge, we’re presented with a login screen with a email, and a secret. Can we find the necessary information to log into the app?
Watch the below video to find out!
Like my content? Buy me a coffee – http://buymeacoffee.com/thefluffy007
Another day, another challenge.
In this post, we’re going to solve the first CrackMe challenge.
After reading the instructions, we need to find the secret string using techniques such as decompiling an Android app, and try to reverse engineer the source code.
Watch the below video for more details and to find the secret string!
Like my content? Buy Me a Coffee!
You must be logged in to post a comment.