Purple Team
Published in

Purple Team

“Defend the Web” write-up (Intro 6— client code modification vulnerability)

Modified versions of programs are far more prevalent than you might imagine. There is a whole security sector dedicated to detecting and deleting illegitimate mobile app versions from app marketplaces. Organizations can have limited to extremely successful means of discovering unauthorized copies of code in the wild, depending on the approach adopted to solve the problem of detecting code change. Binary patching, local resource modification, method hooking, method swizzling, and dynamic memory alteration are all included in this…




Help cybersecurity professionals to enhance their knowledge.

Recommended from Medium

{UPDATE} Tuscany Hotel Hack Free Resources Generator

We’re still using 19th century thinking when it comes to data

1.9 Compare IPv6 address types

{UPDATE} Late Night Princess Party Makeover Hack Free Resources Generator

{UPDATE} Forex Game Hack Free Resources Generator

Cybesecurity Free Courses

It’s time to mint the Meelon!

How To Block / Blacklist a Number on TECNO Pouvoir 3

How To Block / Blacklist a Number on TECNO Pouvoir 3

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Artykov

David Artykov

Cybersecurity Professional

More from Medium

A flaw in Microsoft Defender allows hackers to avoid malware detection

Hack a Linux Desktop with The Cheapest USB Rubber Ducky and The Android Terminal (Termux)

Cyber Deception: Here! Have some Honey

Netboot Raspberry Pi using Ubuntu 20.04 OS