Cedric’s Cruft

  • Blog

Adding an external hard drive to the Unifi Cloud Key Gen2 Plus

I’ve been expanding my homelab with Unifi Protect gear. To run the Protect backend at this time you need either a Cloud Key Gen2 Plus, Dream Machine Pro, Dream Machine Special Edition or UNVR (Pro). All of these are rack-mounted systems except for the Cloud Key Gen2 Plus, which is a relatively compact option in […]

Read Post
February 27, 2022 Uncategorized

Tracing API calls in Burp with Frida

A few weeks ago I was performing a security test on a mobile banking application. The application was using a framework that provided additional obfuscation and encryption on top of the TLS connection it used to communicate with the remote server. I used Frida to intercept and dump the plaintext requests/responses before the encryption took […]

Read Post
January 12, 2017 Uncategorized

SANS Holiday Hack Challenge 2015 writeup

In December 2015, the SANS institute released the Holiday Hack Challenge 2015. A whole storyline was created around the ATNAS corporation and their nefarious plans for Christmas. The hack challenge featured a gaming component, the quest, where you were placed in the Dosis neighborhood. During the quest you are asked to solve hacking challenges and […]

Read Post
January 5, 2016 Uncategorized

SECCON 2015 – Reverse engineering Android APK 2 – 400 writeup

This is a writeup for the SECCON 2015 CTF challenge “Reverse-Engineering Android APK 2” for 400 points. The hint was: “The key is stored in the application, but you will need to hack the server.“ First, I installed the APK to get a feel of what it did, there were only two functions implemented: registering […]

Read Post
December 7, 2015 Uncategorized

WordPress up to version 4.1.2 Stored XSS vulnerability

WordPress 4.1.2 is available as of April 21, 2015. WordPress versions 4.1.1 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site (WP blog). tldr; mysql → special characters → truncation → input validation → output sanitisation → xss → time to update WordPress. Introduction: MySQL […]

Read Post
April 23, 2015 Uncategorized

Reverse engineering the HITB binary 100 CTF challenge

Disclaimer for legal people: “I” and “me” are nicknames in this blog post. They refer to a person who may or may not be me, myself, or I. During the HITB conference (Hack In The Box) in Amsterdam last week, a Capture The Flag challenge was organised. Six categories were available of which you could […]

Read Post
June 4, 2014 Uncategorized

Intercepting Android native library calls

Edit: at the time of writing, not many details could be disclosed as part of a responsible disclosure policy. The application in question was BlackBerry Messenger (com.bbm). BlackBerry did not respond to our findings. The full report is now available (unrevised version, including typos, mistakes, etc.). As part of a uni project, we’ve been busy […]

Read Post
December 11, 2013 Uncategorized Android, ARM, Dalvik, debugging, decompile, disassemble, gdb, LD_PRELOAD, loader, native libraries, shared object, SSL, wrap, Zygote
Recent Posts
  • Adding an external hard drive to the Unifi Cloud Key Gen2 Plus
  • Tracing API calls in Burp with Frida
  • SANS Holiday Hack Challenge 2015 writeup
  • SECCON 2015 – Reverse engineering Android APK 2 – 400 writeup
  • WordPress up to version 4.1.2 Stored XSS vulnerability
Recent Comments
    Archives
    • February 2022
    • January 2017
    • January 2016
    • December 2015
    • April 2015
    • June 2014
    • December 2013
    © 2013-2022 Cedric Van Bockhaven