Communication Data Decryption

Communication Data Decryption Based on Frida

dezembro 27, 2019

After completing the audit work, I discovered many out-of-bounds vulnerabilities and our vulnerability verification shows that the vulnerable program has no lack of data encryption. Initially, I handle it in the usual way: figure out the entire encryption process and write a Burp plug-in or mitm proxy script for data encryption and decryption. (mais…)

Search

Inscreva-se no Blog da NSFOCUS