Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 22 February 2024
Kfc Club

Patrick Stash
banner expire at 13 August 2024
BidenCash Shop
banner Expire 10 May 2025
Money Club cc shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Introduction to reverse engineering

Neon Ghost

TRUSTED VENDOR
Staff member
Joined
Dec 3, 2020
Messages
2,270
Hi guys,

I am doing quite a lot of reverse engineering of known application to find exploits which I report and help to fix. 3 years ago I was able to do so with GetTaxi which is a known application which work like Uber but is connected to real taxi companies and work in Israel, London, Russia and few other places. GetTaxi reacted extremely well and took care of the vulnerability as the professional they are.

Anyhow, 3 years later I decided to share the white paper I wrote to disclose the vulnerability as it contains the entire logic procedure of how the exploit was found.

I warn you : the exploit do not work anymore. It got reported and fixed by the great team of GetTaxi.

If you are interested send me a PM and I will send you a link to the PDF.

Cheers

Preview of the PDF content :

Capture_d_e_cran_2018_05_28_a_22_18_30.png
 
Top Bottom