Android Hacking, Part 2: How to Embed a Backdoor into an Android APK

Welcome back, my fledgling hackers! Mobile devices–smartphones and tablets–are proliferating around the world and slowly overtaking desktop and laptop machines. These mobile devices generally run either the iOS or the Android operating system, with Android comprising the bulk of all mobile device OS’s (82%). Considering the growth of the mobile market and the dominance of […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading