Purple Team
Published in

Purple Team

“Defend the Web” write-up (Intro 6— client code modification vulnerability)

Modified versions of programs are far more prevalent than you might imagine. There is a whole security sector dedicated to detecting and deleting illegitimate mobile app versions from app marketplaces. Organizations can have limited to extremely successful means of discovering unauthorized copies of code in the wild, depending on the approach adopted to solve the problem of detecting code change. Binary patching, local resource modification, method hooking, method swizzling, and dynamic memory alteration are all included in this…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store