Page 2 of 10
Creating a jailed web server is a fun exercise to learn how about jails. If you are reading this post, you are probably already convinced of the benefits of running your services inside jails. A jailed service provides additional security by restricting...
Read More...
Here is the list of the videos I'm looking forward for the 2020 WWDC. I might add notes/comments later when I have seen them all.
Swift and...
Read More...
Sometimes deciding on a partition schema could be a confusing, here are my notes on partitioning a GPT disk. I hope you find them useful.
I will advice creating a virtual machine using FreeBSD and take it for a spin. It would be nice if we had lots...
Read More...
When working on the command-line, I sometimes would like to record what I was doing to extract the exact message a script returned without having to rerun all the commands. Similarly, when I'm trying to report an error to a coworker and want to show...
Read More...
We get excited about starting a new project. It allows us to use new technologies, and we don't have to worry about being compatible with any old code. In reality, most of the work we do is maintenance. And I do believe, that working with legacy code...
Read More...
I use Parallels on macOS to spin virtual machines for learning purposes. Lately, I've been interested in FreeBSD, so I wanted to create a slimmed-down version of the FreeBSD Kernel for my VM. And that is the topic of this post, how to create a custom...
Read More...
I use Middleman as my Static Site Generator, I have two "blogs" in my site:
-
blog
- contains more lengthy and detailed articles.
-
til
- contains short entries that I use as a reference, and not necessarily a full well-researched article.
When I created...
Read More...
One of the first steps we take when analysing a macOS (or *OS) app is to go through the entitlements to extract useful information. Usually, we search for the entitlements embedded in the application binary using codesign(1)
in our Static Analysis...
Read More...
When performing dynamic analysis, a useful source of information is examining the process' memory for specific patterns. For example, imagine we would like to obtain information about the current process' code signature. To get this information, we...
Read More...
When we are asked to perform a black-box security analysis on an iOS app, depending on the scope, we might only have access to the iOS app from the AppStore. But most of the time, the client would give us an IPA. In a black-box analysis, we won't get...
Read More...