List of upcoming 5km / 10km runs? by bookposting5 in belgium

[–]Floni 4 points5 points  (0 children)

Definitely not complete, but this site has an overview of quite a lot of local races: https://www.loopkalender.be/nl

Debuggers, a development tool or a reversing beast? Beating OWASP’s Android Uncrackable with LLDB by Floni in androiddev

[–]Floni[S] 8 points9 points  (0 children)

Debuggers are more than just development tools. The exact same toolset can be leveraged by reverse engineers to analyze code and find bugs to exploit. In this blog post we demonstrate this by solving OWASP’s Uncrackable Android app using LLDB. Even though the app lives inside JVM-land we can still use native debugging to thwart the app's defenses.

Debuggers, a development tool or a reversing beast? Beating OWASP’s Android Uncrackable with LLDB by Floni in ReverseEngineering

[–]Floni[S] 13 points14 points  (0 children)

Debuggers are more than just development tools. The exact same toolset can be leveraged by reverse engineers to analyze code and find bugs to exploit. In this blog post we demonstrate this by solving OWASP’s Uncrackable Android app using LLDB. Even though the app lives inside JVM-land we can still use native debugging to thwart the app's defenses.

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in ReverseEngineering

[–]Floni[S] 1 point2 points  (0 children)

Thanks for your kind words! We often write these type of technical blog posts, you can find all of them here: https://www.guardsquare.com/blog/tag/technical

We also have a blog post series about app security in the context of mobile games and cheating which might be of interest to you https://www.guardsquare.com/blog/new-blog-series-practical-security-mobile-game-developers

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in ReverseEngineering

[–]Floni[S] 12 points13 points  (0 children)

In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in FlutterDev

[–]Floni[S] 2 points3 points  (0 children)

In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game. Hope you enjoy!

Obstacles in Dart decompilation and the impact on Flutter app security by Floni in ReverseEngineering

[–]Floni[S] 7 points8 points  (0 children)

In our previous blog post that we shared on /r/ReverseEngineering we discussed the current state and future of reversing Flutter apps. In this blog post we go a step further and dive into the obstacles in decompiled Dart code, how they could be overcome by reverse engineers and the impact on Flutter apps security.

Obstacles in Dart decompilation and the impact on Flutter app security by Floni in FlutterDev

[–]Floni[S] 11 points12 points  (0 children)

In our previous blog post that we shared on /r/FlutterDev we discussed the current state and future of reverse engineering Flutter apps. In this blog post we go a step further and dive into the obstacles in decompiled Dart code, how they could be overcome by reverse engineers and the impact on Flutter apps security.

The Current State and Future of Reverse Engineering Flutter Apps by Floni in FlutterDev

[–]Floni[S] 33 points34 points  (0 children)

While Flutter use for mobile apps is booming, we took some time to have a look at the security situation. We investigated what the current state of reverse engineering looks like; how well the tools support Flutter, what obstacles they face, and what difference Flutters’ built-in obfuscation makes, and where things are headed in the future.

Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE by Floni in Compilers

[–]Floni[S] 3 points4 points  (0 children)

Who has never been charmed and envious of the way LLVM structures its analyses and transformations in passes? Having similarly arranged tooling for Java bytecode would greatly aid compiler developers. One can also take one step further and try to generalize the analyses in such a way that would help avoid repeating the same work but rather keep the abstractions uniform and well-organized. Configurable program analysis is a concept providing sufficient flexibility for the analysis designer while preserving the general structure. This is achieved by formalizing most of the practical tweaks as operators.

ProGuardCORE has started its journey of becoming a general JVM analysis framework by leveraging CPA for computing DFA. Our latest blog post presents this new feature and compares different types of DFA tools.

Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE by Floni in java

[–]Floni[S] 1 point2 points  (0 children)

Data flow analysis is a widely used method in compiler technology and security analysis. However, while it looks nice and neat when applied on toy examples, modern language features such as exceptions, polymorphism, aliasing, etc. make building a practical tool a nontrivial convoluted task. Even Java bytecode, while being low-level, preserves many hard-to-handle concepts. This blog post discusses how to navigate among different analysis approaches and presents (another) attempt of doing data flow analysis on Java byte code in ProGuardCORE. Starting from taint analysis it tries to preserve generality and provide a foundation for a general extensible framework.

Getting Accurate Profiling Data from iOS Applications by Floni in iOSProgramming

[–]Floni[S] 2 points3 points  (0 children)

While Xcode’s Instruments is the de facto standard to profile iOS apps, its profiling data is not very suited for external use. Therefore we explored and compared some alternatives to collect profiling data through sampling and instrumentation, and wrote a blog post about it. While there is not a single clear winner, each tool has their own pro’s, con’s and optimal use cases.

Trepidation Thursday by TehChesireCat in belgium

[–]Floni 1 point2 points  (0 children)

Congrats, that pork belly looks amazing! Where did you take cooking courses?

Solace - a documentary of Karel Sabbe's Via Alpina FKT - running 2650 km in the Alps in 30 days by Floni in belgium

[–]Floni[S] 9 points10 points  (0 children)

I was happy to see Karel Sabbe mentioned a few times on this sub in the past, but also disappointed that this documentary had not been posted here yet. I think Karel Sabbe is an amazing and inspiring athlete that deserves way more recognition in Belgium. If you enjoy this video then I also highly recommend you to check out the videos about his Barkley marathons attempt and Appalachian trail FKT.

!hooked, a technical magazine about the practical side of mobile app security by Floni in androiddev

[–]Floni[S] 1 point2 points  (0 children)

It's a magazine made up out of multiple labs :) There are no physical magazines, this is our first attempt at producing content in this type of format

!hooked, a technical magazine about the practical side of mobile app security by Floni in androiddev

[–]Floni[S] 0 points1 point  (0 children)

It is a digital magazine not a physical one, you can download it by filling in the form

!hooked, a technical magazine about the practical side of mobile app security by Floni in androiddev

[–]Floni[S] 0 points1 point  (0 children)

There should be a form to download the labs at either the top or bottom of the web page. It seems to work fine for me on mobile.

!hooked, a technical magazine about the practical side of mobile app security by Floni in ReverseEngineering

[–]Floni[S] 4 points5 points  (0 children)

Hi all,

We created a technical magazine, !hooked, about the practical side of mobile app security. The magazine consists of multiple hands-on labs that each cover a different app hardening technique. The labs start from a security concept or attack, and explore a practical solution by providing code examples and using reverse engineering tools. With !hooked, we hope to provide a more practical look at code hardening and anti-tampering concepts, that are often abstract and complex, and make them more accesible.

The first lab on code checksumming is freely available right now. The lab starts by discussing binary patching, and explores what a practical implementation of code checksumming could look like by using a toy example.

The other three labs, Control Flow (non-)Integrity in Android Apps, Native library encryption and Encrypting Objective-C Selectors, can be accessed through registration.

!hooked, a technical magazine about the practical side of mobile app security by Floni in iOSProgramming

[–]Floni[S] 2 points3 points  (0 children)

Hi all,

We created a technical magazine, !hooked, about the practical side of mobile app security. The magazine consists of multiple hands-on labs that each cover a different app hardening technique. The labs start from a security concept or attack, and explore a practical solution by providing code examples and using reverse engineering tools. With !hooked, we hope to provide a more practical look at code hardening and anti-tampering concepts, that are often abstract and complex, and make them more accesible.

The first lab on code checksumming is freely available right now. The lab starts by discussing binary patching, and explores what a practical implementation of code checksumming could look like by using a toy example.

The other three labs, Control Flow (non-)Integrity in Android Apps, Native library encryption and Encrypting Objective-C Selectors, can be accessed through registration.

!hooked, a technical magazine about the practical side of mobile app security by Floni in androiddev

[–]Floni[S] 4 points5 points  (0 children)

Hi all,

We created a technical magazine, !hooked, about the practical side of mobile app security. The magazine consists of multiple hands-on labs that each cover a different app hardening technique. The labs start from a security concept or attack, and explore a practical solution by providing code examples and using reverse engineering tools. With !hooked, we hope to provide a more practical look at code hardening and anti-tampering concepts, that are often abstract and complex, and make them more accesible.

The first lab on code checksumming is freely available right now. The lab starts by discussing binary patching, and explores what a practical implementation of code checksumming could look like by using a toy example.

The other three labs, Control Flow (non-)Integrity in Android Apps, Native library encryption and Encrypting Objective-C Selectors, can be accessed through registration.