Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs, configuration files, database files, keychain, network settings, offline web application cache, safari bookmarks, cookies and application data, etc. It also backups […]
Blog
Reversing Training Session Part 11 – Exp
Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Amit has delivered one of his best session on ‘Practical Reversing VI – Exploit Development Advanced’. This is part of our ongoing FREE ‘Reversing & Malware Analysis Training’ started since our Jan 2012 meet. Today we had solid response from the crowd […]
DLL Injection and Windows 8
Recently while working on new version of RemoteDLL, I discovered interesting changes around DLL injection on Windows 8. Before I actually talk about new changes, here is little background story. CreateRemoteThread is most common method used for DLL injection. It used to work flawlessly till Windows XP. However since Vista, it changed the colors, mainly […]
Nullcon Delhi 2012 – Final List of Speak
We are excited to announce the final list of speakers and events at nullcon Delhi 2012. We are also thrilled to screen the preview of Reboot. Our sincere thanks to Sidney Sherman and Joe kawasaki. Some of the featured talks Rahul Sasi – DTMF Fuzzing: Highly Harmful Audio Waves – Would be highlighting vulnerabilities in […]
Released JDownloaderPasswordDecryptor v2...
Here is the delightful news for all JDownloader fans. We have just released new version of JDownloader Password Decryptor v2.0 which supports password recovery from latest JDownloader 2 Beta edition. Over the last couple of months we have received numerous requests to support JDownloader 2 beta version. Some of them even sent us account config […]
Released New Tool – Router Password Krac
Here comes our 90th Free Tool – Router Password Kracker. It is free tool to quickly recover lost password from Router, Modem or Website protected with HTTP BASIC Authentication. It comes with simple and cool GUI interface making it easier for everyone from layman to expert. Also Penetration Testers and Forensic Investigators can find this […]
Demystifying Compiler Optimization – Dif
I analyzed some simple source code examples running in visual C++ (without optimization option) and Dev C++. I saw that VC++ code is slightly optimized then DEV C++. The following code shows the difference between function calls on both the compilers. In visual C++: push eax mov ecx, [local.1] push ecx call F Dev C++: […]
Training Session Part 10 – Practical Rev
Here is the quick update from our this month’s Local Security meet (sx/null/g4h/owasp) where Harsimran/Amit had delivered a splendid session on ‘Practical Reversing V – Exploit Development Basics’. This is part of our ongoing FREE ‘Reversing & Malware Analysis Training’ started since our Jan 2012 meet. Harsimran was supposed to deliver this presentation. However […]
nullcon Security Conference Delhi 2012 H...
We at nullcon feel proud to be at the forefront of the IT Security arena in the Asian IT Industry. With the fourth event in the row, we continue to deliver the latest and responsible vulnerability disclosures and their mitigation solutions which help organizations take proactive and timely protective measures to safeguard their critical data […]
Released New Tool – Windows Password Kra
Windows Password Kracker is the free & easy to use tool to recover the Windows login password. It supports password recovery from both LM (LAN Manager) or NTLM (NT LAN Manager) hash. First you need to dump the password hashes from live or remote system using pwdump tool. Then feed the hash (LM/NTLM) for the […]