Hacker Newsnew | past | comments | ask | show | jobs | submit | reeeeaway's commentslogin

Alternatively, give frida a go. It handles all the hard parts for you magically and then you get to instrument the binary with Javascript :) mixing dynamic and static techniques is really powerful


Certificate pinning perhaps?


Righto, looks like impossible to fix then.


On newer versions of android it can be hard to install a root cert and trust it; mitmproxy and httptoolkit both have some great guides though. On iOS its easier - but yeah unfortunately/fortunately certificate pinned applications wont work

Depending on how much time you are willing to put in you could create a list of apps that dont PIN and selectively MiTM apps that dont


Looking at the postgres JDBC source, it sanitizes parameters when prepared statements and parameterization is used. Different implementations may do different things here though


Could you describe it conceptually how they do it?


The method doAppendEscapeLiteral (Line 66) is a good example; https://github.com/pgjdbc/pgjdbc/blob/master/pgjdbc/src/main...

I didn’t take notes all the way down, but at the end of the day this method is invoked when a prepared statements’ parameters are being bound


Company xyz is hiring, amazing place to work blah blah, you would be perfect! Then the email is CCed to 50 other students and you find out the guy sending it only started at the company last month and gets paid a large bonus for whatever sheeple he can bring in :)

Don't forget after joining you have to make that post telling everyone how this is your dream job and show off the company goodie bag! #WeAreHiring #ChiefJediFinder


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: