Open in app
Home
Notifications
Lists
Stories

Write
Alex Myers Security Engineer
Alex Myers Security Engineer

Home

Apr 6, 2021

Dynamic Mobile App Security Testing (DMAST) with Android Emulator OWASP ZAP

A nice way I’ve found to run dynamic security tests on Android apps is using an Android emulator on your local machine, in conjunction with OWASP ZAP. Since these are both free tools, this should not cost you anything, other than some time, RAM and storage space. Part 1: Set…

Mast

4 min read

Dynamic Mobile App Security Testing (DMAST) with Android Emulator OWASP ZAP
Dynamic Mobile App Security Testing (DMAST) with Android Emulator OWASP ZAP

Jun 5, 2019

The power of cron

In this post, I’d like to give a brief overview of the cron program in Linux, with which I’ve been experimenting lately. Cron is a daemon (i.e. a continuously running program) that springs into action based on temporal events, as opposed to other triggers. Every minute it checks the config…

Security

7 min read

The power of cron
The power of cron

May 3, 2019

Forensics — LoadSomeBits

As you might expect, the final picoCTF Forensics exercise is the most challenging. I encountered a few red herrings along the way and I’d like to detail these first before moving on to explain two publicly available Python scripts that enable you to capture the flag. The file from which…

Endian

6 min read

Forensics — LoadSomeBits
Forensics — LoadSomeBits

Mar 28, 2019

Forensics — Ext Super Magic

I found this to be among the most difficult of the picoCTF challenges in the Forensics section. The first thing I puzzled over is how to fix the corrupted file provided to us: ext-super-magic.img. There were quite a few links provided in the hints, some of which turned out to…

Ctf

3 min read

Forensics — Ext Super Magic
Forensics — Ext Super Magic

Mar 27, 2019

Forensics — Recovering from the Snap

This CTF exercise involves recovering deleted files from a disk image file: animals.dd. Try mounting this image file on your Linux machine. You can do this easily in the GUI by right-clicking the image file and opening it with “Disk Image Mounter”: You should then see the mount point…

Linux

3 min read

Forensics — Recovering from the Snap
Forensics — Recovering from the Snap

Mar 27, 2019

Forensics — Desrouleaux

I’d like to start with this challenge as it took me quite a lot of time to figure out. You can either do it manually or with a Python script. I tried at first doing it manually, but had no luck with the final question that needed to be answered…

Python

2 min read

Forensics — Desrouleaux
Forensics — Desrouleaux

Mar 27, 2019

“picoCTF” writeup series

A “Capture the Flag” (or CTF) approach can be applied to anything, from real world games to computer games to self-teaching. Having a specific, limited goal to work towards can really focus the mind and is less overwhelming than trying to achieve a more ambitious goal in one improbable leap…

Ctf Writeup

2 min read

“picoCTF” writeup series
“picoCTF” writeup series
Alex Myers Security Engineer

Alex Myers Security Engineer

A variety of topics related to the information security (infosec) field

Following
  • The Economist

    The Economist

  • The Guardian

    The Guardian

  • The New Yorker

    The New Yorker

  • The Economist news desk

    The Economist news desk

  • Niall Ferguson

    Niall Ferguson

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable