Syndicated Blog

8kSec
8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 6 – Utilising writers

Advanced Frida Usage Part 6 – Utilising writers

| | Frida, Uncategorized
Introduction Welcome to another blog post in our series on Advanced Frida Usage. We have covered a lot of features already but we still haven’t mentioned really important one and that is ...
Mobile Malware Analysis Part 6 – Xenomorph

Mobile Malware Analysis Part 6 – Xenomorph

| | mobile malware
Application Detail Name: <code>Chrome</code> Package: com.givemountaintnk SHA-256 Hash: a610ed6f7e7257d7abd396cc8906d35dccde0bd7a205a90a95b2de52df3efc1f Introduction Welcome to the sixth installment of our Mobile Malware Series, dedicated to dissecting the latest threats and fortifying your cybersecurity defenses. In ...
ARM64 Reversing And Exploitation – Part 10 – Intro to Arm Memory Tagging Extension (MTE)

ARM64 Reversing And Exploitation – Part 10 – Intro to Arm Memory Tagging Extension (MTE)

| | arm64
Hey all! In this blog, we will give a brief introduction to a relatively new security feature called MTE (Memory Tagging Extension). Even though it was announced years ago, there was no implementation ...
Mobile Malware Analysis Part 5 – Analyzing an Infected Device

Mobile Malware Analysis Part 5 – Analyzing an Infected Device

| | mobile malware
In the first part of iOS Malware Detection as a part of our Mobile Malware Analysis Series, we covered how to gather forensics artifacts, what to use to do analysis and what ...
Mobile Malware Analysis Part 4 – Intro to iOS Malware Detection

Mobile Malware Analysis Part 4 – Intro to iOS Malware Detection

| | mobile malware
Welcome to Part 4 of the Mobile Malware Series. In this part we will cover what is iOS malware, its types, methods of gathering forensics information, as well as, taking a look ...
ARM64 Reversing And Exploitation Part 9 – Exploiting an Off by One Overflow Vulnerability

ARM64 Reversing And Exploitation Part 9 – Exploiting an Off by One Overflow Vulnerability

| | arm64
Hello everyone! In this blog post, we will dive into a new vulnerability called off by one byte overflow . But before we get into the details, there are a few things you ...
ipsw Walkthrough Part 2 – The Swiss Army Knife for iOS/MacOS security research

ipsw Walkthrough Part 2 – The Swiss Army Knife for iOS/MacOS security research

| | Uncategorized
In the first part of this series, we went over the most of ipsw commands and today we will continue with the rest of them. We will see how to work with ...
ARM64 Reversing And Exploitation Part 8 – Exploiting an Integer Overflow Vulnerability

ARM64 Reversing And Exploitation Part 8 – Exploiting an Integer Overflow Vulnerability

| | arm64
Hello everyone, In this blog, we will explore integer overflows and their potential to create issues within your software. We will provide a walkthrough of a small CTF binary to illustrate their ...
ipsw Walkthrough Part 1 – The Swiss Army Knife for iOS/MacOS security research

ipsw Walkthrough Part 1 – The Swiss Army Knife for iOS/MacOS security research

| | Uncategorized
In this first blog post about ipsw tool we will see its basic uses and how it can make our life a lot easier. ipsw is a tool that can be used ...
Mobile Malware Analysis Part 3 – Pegasus

Mobile Malware Analysis Part 3 – Pegasus

| | mobile malware
Application Detail Name: <code>Media Sync</code> Package: seC.dujmehn.qdtheyt SHA-256 Hash: bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a Introduction Welcome back, malware enthusiasts, to the third chapter of our Mobile Malware Analysis saga! Today, we’re diving headfirst into the world ...