Skip to content

{ Author Archives }

Use cuda-gdb on OS X Mountain Lion

Last week I was using cuda and after an hour trying to debug my code I decided to see if cuda had something similar to gdb  and I came across cuda-gdb . Happy,  I opened my terminal and typed in a simple command to debug my small cuda application, unfortunately, I directly received an error message similar to this […]

Tagged , , ,

XSS in the iOS Facebook App

A few months ago, I found an XSS on the iOS mobile Facebook app, and contacted facebook about the flaw via their white hat page, unfortunately for me, I wasn’t eligible for anything because the flaw had already been reported (guys, even t-shirt would have been fun). Since the iOS mobile app had to be updated, I decided […]

Tagged , , , ,

GCC in OSX Mountain Lion

A few days ago I reinstalled OSX Mountain Lion on my MacBook Pro, and each time I do, one of the first things I re-install is “xcode“,  because it  installs GCC  on the mac. As a programmer and ethical hacker I use mainly C, but yesterday I needed C++  , so as it was my first time […]

Tagged , , , ,

Forensic : Disable Pattern Locks on Android

This morning I came across this new method to “Disable Pattern Locks on Android” and I believe that it’s an awesome news for the forensic world. From a mobile forensic point of view, the news will help forensic examiners to recover data, however the forensic examiner will have to delete files and the phone and […]

Tagged , ,

PlainText Passwords at HMV

Today I received a mail from HMV telling me that my two years old points where going to expire, and that’s how I decided to log in on the website and spend them. Unfortunately I did not remember my password and clicked directly on the button “password reminder”.  A few minutes later, I received an e-mail […]

Tagged , , ,

Learn Software Exploitation

Since a few years I have seen many questions on forums pretty similar to that one “how to learn hacking ?“, and usually the answer is “you have to try“. Usually the answers are not very helpful nor redirect the new ethical hackers to good ressources. To answer that question myself, I would begin with […]

Flaws in The USA

Lately, I was traveling across the United States, I went from Miami to the big apple stopping here in there when there was something to visit, anyway during the trip I saw a fair amount of security issues that are well know, but I thought they would all be fixed by now, but nope ! so […]

Password Leaks and Password Managers

These last months have been very busy in password leaks, LinkedIn, Last FM, Yahoo, Le Figaro, PhAndroid, and finally today, I received an e-mail from Nvidia. After the Sony PS3 Network leak, I thought that I should use a secure password manager online, first because I ran out of passwords, then because I couldn’t memorize […]

Tagged , , , , , ,

OS X Version of LDD

If you need to use the ldd command on OS X you will face an error.

However, there is a “similar” command called otool  on OS X that you can use :

For the one who never used it,  the ldd  command is used to show the dynamic libraries a executable is linked to, […]

Tagged , ,

Digital Forensic Examination 101 — Part 1

Digital Forensic Examination also known as Forensic Science is used to recover digital data, this science is often used to find evidence on computers, usb keys, and mobiles but forensic examination can also be used to recover data after a computer crash.  This tutorial will try to help you understand the basics of forensic examination […]

Tagged , , , ,