Year: 2022

  • Xamarin: The Next Big Thing in Mobile App Development

    [ad_1]

    Since Microsoft announced its acquisition of Xamarin, the mobile app development turned his head towards the relative clan of the most popular app development across platforms. The fact that Xamarin’s products were used by 1 million developers across 120 countries is an absolute testament to why is it the next big thing in mobile app development.

    To a novice, it is just another mobile platform like Native or Hybrid, for developing apps using C#. But for Top Mobile App Development Companies, it is a godsend to developers. In fact, Xamarin has taken hybrid and cross-platform development to a whole new level and is capable of combining all the platforms (Android, iOS, Windows or Hybrid and Cross-platform) into a single mobile application using the same code.

    Xamarin: What is it?

    Xamarin is a product which works on .NET and C# to produce original native Android and iOS apps with the same functions. It is a Microsoft-owned code language which uses cross implementation of the Common Language Specification (CLS) and Common Language Infrastructure (CLI).

    Technically speaking, it is the shared code base which makes it possible to combine all platforms into one single app. Xamarin shares the C# code base for development. Using the code base, Top App Developers in India develop apps for native Android, iOS, Windows, Cross-Platform and Hybrid platforms and share them across multiple platforms.

    Xamarin: Why is it important?

    Let’s say you have developed and launched a native android app and over a period of time, it has become a huge success in the app market. What will be your next move? iOS platform??

    Why begin from the scratch when you can avail the shared codebase of Xamarin which can help you develop apps across multiple platforms.

    The added advantage of Xamarin is that it can provide Microsoft-owned products like Visual Studio and NuGet, and integrates .NET portable class libraries for coding. It also allows the developers to add the component to their apps straight from the IDE. Backends like Azure, Salesforce, SAP and Parse can also be integrated within the app. In fact, Xamarin offers the best of both the worlds – Native Java Code Ability and Code Re-usability.

    Xamarin: Products

    Top Mobile App Development Companies entirely rely on Xamarin’s product is no surprise! Enriched application tools and integrated component store make it much easier for the developers to deal with. Xamarin.Forms, Xamarin Test Cloud, Xamarin for Visual Studio, Xamarin Studio, Xamarin.Mac, .Net Mobility Scanner and RoboVM are the products offered by Xamarin (Microsoft-owned).

    Xamarin is one the best mobile app development platforms. Looking forward to developing a Xamarin App?

    Find the best team of technical developers who have developed several Xamarin apps across Android, iOS and Windows platforms.

    [ad_2]

    Source by Sathish Arumugam

  • Python Roadmap for Beginners

    Python Roadmap for Beginners

    One these days python can be most popular programming language of all Devlopers and also its Very Beginners friendly, So in this is blog I can share the Full Python Roadmap for Beginners. So let’s started.

    According to the Stack Overflow Devlopers in 2021, Python is the 3rd most popular language.

    And the growth dosen’t seems slow down anytime, So Python programmers high in demands.

    And in this article you will see why Python language in so greate for Beginner Coders, and also you see How we can start to learn this language.

    Full Python Roadmap for Beginners with Free Resources

    We are Give you Full Resources and also explain full learning path step by step.

    What is Python Programming language ?

    Python… the most Popular and growing language was designed by Guido van Rossum, a Dutch Programmer, and its was first released on the 20th Feb 1991.

    People from different disciplines use Python for a variety of different tasks, such as data analysis and visualization, artificial intelligence and Machine Learning, automation, etc. You can write Python script to automate a lot of boring tasks such as copying files and folders, renaming them, uploading them to a server. So Python is not just used by software developers but also it is used by other professionals to automate their tasks and make their life easier. Python is a multi-purpose language, you can use Python to build web apps, mobile apps, and desktop applications as well as software testing and even hacking.

    It is a popular language when working with large amounts of data, so it’s often used for machine learning and data science, as well as data analysis and data processing.

    You can also use Python for web development to create powerful web applications with the help of frameworks such as Django and Flask.

    In addition, Python is a popular language for test automation.

    Why its Name Python ?

    When you think the word Python, then an image of snack probably comes to the mind.

    But the name of the Python programming language was inspired by a BBC comedy series called “Monty Python’s Flying Circus“, which was popular in the 1970s.

    Python is a general-purpose language, and it is used in many fields in the technology sector.

    Why Should You Choose to Learn Python?

    When you first started the learning to code, you may become quickly overwhelmed by sheer number of programming languages.

    So, why should you choose the python instead of other programming language ?

    First of all all programming languages are tools, and its give an instruction – and tell to a computer, what to do and whats task it need carry out.

    That said, there are a few reseaon why Python is a greate first programming language for code newbies.

    First of all python is the high-level server side scripting programming language.

    In Computer, there are two type of Programming language – first is Low-level programming language and 2nd is High-level.

    High-level language have Syntax which is much easier to read, learn, pick-up and write, and that type of syntax is very human-friendly.

    Learning Resources

    There is plenty of documentation and videos available online so it’s very confusing that where to start learning this language especially when Python can be used in various fields. Understand that a single book or video course is not enough to teach you everything in Python and initially as a beginner, you will also get overwhelmed with so many concepts but have patience, explore and stay committed with it. Below are some resources we have filtered out to start learning Python but make sure that whatever resource you prefer your code along with it.

    Free Resources to Learn Python

    Its is enough Python Roadmap for Beginners to learn Python and obviously you need to test your learning by solving some Python Questions. I’ll give you some Python challenge Resources to test your skill and Increase your skill practice.

    Python challenge Resources

    (Python Roadmap for Beginners)

    I also use these top three Resources to improve my Programming skills. I can also suggest you some books name which helps you to Learn Programming.

    Some Books for You

    Fluent Python by Luciano Ramalho
    Fluent Python by Luciano Ramalho
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less
    Python Crash Course by Eric Matthes
    Books for programmerPython Books
    Python Crash Course by Eric Matthes
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    Related

    10 Most-Recommended Books for Software Developers

    Go Developer Roadmap 2022

    Android Vs IOS App Development in Singapore

    Android Vs IOS App Development in Singapore

  • 7 Must Know VS Code Extensions for a React Developer

    7 Must Know VS Code Extensions for a React Developer

    Visual Studio Code has grown over the years to become the best and most popular text editor for java, app and web developers. With more than 14 million users worldwide, Visual Studio Code is unarguably the default text editor for developers.

    Most developers underutilize VS Code because Visual Studio Code comes fully functional out of the box. This can be considered as plug-and-play that is you can download VS Code and start building apps and APIs.

    Install a number of the Visual Studio Extensions mentioned below to make your development a lot of and a lot of power tools than the alternative and make your development a lot of and a lot of power tools than the alternative.

    These popular VS Code extensions apply to JavaScript and ReactJS developers, but there are some general-purpose VS Code extensions that will benefit everyone else.

    You can also read:

    Here are the Top 7 Visual Studio Code Extensions we will cover

    1. React Style Helper

    I feel that if you’re a React developer, you’ll have to write a lot of style elements. This VS code extension will come in handy in this situation. It will make writing styles in JSX much easier. It also has powerful auxiliary development functions in CSS, LESS, and SASS style files. Other capabilities include Autocomplete, Goes to Definition, and Creates JSX/TSX inline CSS styles, among others. There are over 52k installations.

    2. VS Code React Refactor

    Refactoring is one of the tasks that every developer does. If you work on a large project, sometimes, refactoring becomes problematic. This extension will help you in this scenario. It has many features like Extract JSX code parts to a new class or functional component, Supports TypeScript and TSX, is Compatible with React Hooks API, etc. It has around 88k installations.

    3. React PropTypes Intellisense

    I believe that if you have worked with React, you must have worked with PropTypes. In a large project, there will be a lot of PropTypes. The extension finds React PropTypes and adds them to the suggestion list. It has around 85k installations.

    4. ES7+ React/Redux/React-Native snippets

    I think this is the most used VS code extension by React developers. It has almost 4 million installations. This is a must-have VS Code addon for you, in my opinion. This will make things a lot easier for you. This contains JavaScript and React/Redux snippets in ES7+, as you may have guessed from the name.

    5. Git Lens

    Who wrote the code?

    You may think, wait, isn’t this supposed to be a list of VS Code extensions for React? But I believe Git is the only thing that is used by every developer. So I think this will be super helpful for you too if you are a React developer. This extension supercharges the Git capabilities. This helps us to know who, why, and when the code is changed. There are lots of functionalities that can be customized.

    6. Color Highlight

    This is a simple extension but it will help a lot. As developers, sometimes we have to work with lots of colors. This plugin helps to identify the color through color code.

    7. React Documentation

    Documentation is the friend of a developer. It helps us in a variety of ways, such as determining what the property performs and why it is employed. This plugin provides inline documentation for numerous React-related methods/properties, as you could have guessed from the name.

    That’s all for today. I hope this extension will help you to increase productivity and better coding. Hope, that these extensions will help you too.

    10 Most-Recommended Books for Software Developers

    Android Vs IOS App Development in Singapore

    Take Away From Google I/O 2013 – All Androids Are Equal!

  • SMB Best Practices: Questions to Ask Before Contracting With a Security Services Provider

    SMB Best Practices: Questions to Ask Before Contracting With a Security Services Provider

    [ad_1]

    Getting ready to procure managed services to help support or augment your security team? You’re not alone: 62% of organizations said they plan to outsource some or all of their IT security functions in 2022, according to the Foundry 2021 Security Priorities Study.

    Before going down that route, it’s wise to gather your requirements and think about the services you want from a managed security services provider (MSSP).

    There are a several basic considerations when choosing your service provider, including: the MSSP’s experience, the types of support and services they offer, and how their service level agreements are structured. You’ll also want to know the MSSP’s specific domains of expertise and how they correlate with your needs.

    In addition, small and midsize businesses (SMBs) in particular should pay attention to several factors when evaluating their potential partner. When you’ve got a small IT staff, you’ll need to trust the MSSP is adequately able to address:

    • Business continuity: How well does the service provider protect you from different types of business interruptions? Servers, software, and cloud services are subject to outages, and humans make mistakes. Ask the MSSP if they have a disaster recovery site and a strategy for failures in their infrastructure or human errors. Also find out if they have insurance to cover potential liabilities.
    • Self-protection: Third-party and vendor security is critical, especially in light of cyberattacks that affect an entire supply chain. How the MSSP protect itself and your data from being compromised, stolen or encrypted? Which best practices or solutions do they employ to protect their own infrastructure? Do they have storage-side and in-transfer data encryption mechanisms? How do they handle access control and multi-factor authentication?
    • Data accessibility: You must be able to get your data quickly when you need it. Find out how access to your data is regulated and what level of control you will have over your data? Also ask if there are self-service capabilities that give you greater and faster control.

    The steps SMBs must take to prepare internally

    Data is the lifeblood of your organization, so in addition to accessibly, ensure you — and your MSSP — sufficiently plan for data protection.

    “We recommend five vectors around data protection,” said Alex Ruslyakov, channel chief at Acronis. “The first is that organizations should always keep a copy of their data for recovery in case of a security incident.”

    The other four:

    • Data accessibility anywhere, anytime
    • Data control with visibility into its location and use
    • Data authenticity: proof that a copy is an exact replica of the original
    • Multiple layers of security for air-tight data protection against bad actors

    Although no vendor or service provider can claim 100% protection from cyberattacks, the right MSSP has a plan for when an incident does occur, Ruslyakov said. Ask about their recovery strategy and how they ensure that the data being recovered was not compromised/infected.

    Finally, it’s important to have visibility into exactly what you’re paying for. What level of detail can you expect in your invoice? Can the MSSP validate usage for which you’re being charged?

    A service provider’s proven track record and use of best-in-class technology goes a long way toward establishing confidence that the MSSP can fill your security needs. However, SMBs should also dig into the details to ensure their data and business are protected.

    From applications to infrastructure, click here to see how Acronis can help your organization fill security gaps and protect your business.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • An Advanced Phishing Tool !!! Kali Linux Tutorials

    An Advanced Phishing Tool !!! Kali Linux Tutorials

     
    An Advanced Phishing Tool !!! Kali Linux Tutorials

    Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of the program is prohibited and the manufacturer has no responsibility for any illegal use by anyone. Use the tool at your own risk and avoid any sloppy actions.

    Installation Instructions

    Installation on Gnu / Linux OS.

    On terminal

    sudo su

    git clone git://github.com/makdosx/mip22.git

    chmod -R 777 mip22

    cd mip22

    bash mip22.sh

    Installation on Android OS.

    On Termux

    git clone git://github.com/makdosx/mip22.git

    chmod -R 777 mip22

    cd mip22

    bash mip22.sh

    Feautures and Properties

    Mip22 is a modern and advanced cyber security program for computers with Gnu / Linux operating system and mobile phones and tablets with android operating system, for educational purposes.

    Details

    • Automatic method
    • Manual Method
    • Tunnels Setup
    • Email Services
    • Vpn instructions
    • Sound Efects (only for pc)

    Easy to use via terminal.
    Automatic cloned services.
    It has 69 ready cloned electronic services, including social networks, e-mails, cloud, multimedia etc etc.

    Cloning services manually by cloning the service you want. Easy to use through browser service.

    • Tunnels Setup
      It has 3 tunnels to promote these services from the local server to the internet.
      It has ready api for the installation of some tunnels.
    • Email Services
      It has 3 well-known external email services found on the internet where you can visit to send an email.
    • Vpn instructions
      It has various instructions fron vpn on Android OS.
    • Sound Efects (only for pc)
      It has various effects such as music in the background.

    Kali Linux – The Best Tool For Penetration Testing?

    Best Ways to Hire a Hacker for Mobile Phone Hack: Hackers for Hire

  • 7 Reasons To Root Your Android Phone

    [ad_1]

    Android is a very versatile, customizable and open operating system. You may think that rooting is not for you, but it can actually help you to a very great extent. With so little work, so much can be achieved. You may have heard bad things about rooting but in some cases, you may consider using it, especially if it is done by people who are aware of what needs to be done. Some of the reasons include:

    1. Features and apps

    Rooting helps you to get the features that you really want. There are times when an app may be blocked by different carriers or may hack into the system files or may be unavailable. Rooting assists with this making the apps that had been incompatible previously to be compatible. Rooting gives you the chance to do so much more with your gadget.

    2. Automation

    There are apps that one can use so as to automate everything on the phone. If you root, then there is so much more that you will discover. Some tasks like turning on the screen, changing speed of the CPU, toggling GPS and 3G all require rooting. When you want to reap the full benefits of some apps, then it is totally necessary to root.

    3. Boosting the speed and battery life

    There is so much more that can be done if at all you need to boost battery life and also speed up the phone even if you do not root. However, if you do root, you get so much more power. There are apps that you can use to overclock or under clock the phone so as to have greater performance. You can use yet others apps, so as to hibernate some of the apps that aren’t in use.

    4. Blocking ads in apps

    Ads can be very irritating and they actually use up your data. If you want the ads blocked in devices and apps, then rooting can actually help to a great extent. There are various options that you can pursue if your phone is rooted.

    5. Backing up the transitions

    When you change devices or when the device is restored, you can back up the apps and the settings. In this way, it becomes easier to get the setups. There are things that can be backed up without rooting.

    6. Removing any preinstalled crap ware

    Backup is great and it can uninstall the battery draining and space wasting ware that is usually preinstalled on some phones today. The feature is root only. If you have your phone rooted, then all you have to do is to freeze them so as to allow the phone to work as it should and then delete them so as to free the space.

    7. Tweaking the dark corners

    Rooting is a great idea if you really like fiddling with the features. You can customize almost everything, including the layout of the keyboard or even increasing the scrolling speed. You will be able to multitask better.

    [ad_2]

    Source by Shalini Madhav

  • Nuclei Plugin For BurpSuite !!! Kali Linux

    Nuclei Plugin For BurpSuite !!! Kali Linux

     
    Nuclei Plugin For BurpSuite !!! Kali Linux

    Nuclei-Burp-Plugin is a BurpSuite plugin intended to help with nuclei template generation.

    Features

    Template matcher generation

    • Word and Binary matcher creation using selected response snippets from Proxy history or Repeater contexts
    • Multi-line selections are split to separate words for readability
    • Binary matchers are created for selections containing non-ASCII characters
    • The part field is auto-set based on whether the selection was in the request header or body
    • Every generated template auto-includes a Status matcher, using the HTTP status code of the response

    Request template generation

    • In the Intruder tab, selected payload positions can be used to generate request templates, using one of the following attack types: Battering ramPitchfork or Cluster bomb
    • The selected text snippet from an HTTP request under the Proxy or Repeater tab can be used to generate a request template with the attack type defaulting to Battering ram

    Template execution

    • Generated templates can be executed instantly, and the output is shown in the same window for convenience
    • The plugin auto-generates the CLI command, using the absolute nuclei path, absolute template path and target information extracted from the desired request
    • History of unique, executed commands are stored, can be quick searched and re-executed within the current session

    Experimental features

    • (Non-contextual) YAML property and value auto-complete, using reserved words from the nuclei JSON schema
    • Syntax highlighting of YAML properties, based on reserved words

    Productivity

    • Almost every action can be triggered using keyboard shortcuts:
      • F1: open nuclei template documentation
      • Ctrl + Enter: execute current template
      • Ctrl + Shift + E: jump to the template editor
      • Ctrl + L: jump to the CLI input field
      • Ctrl + R: show CLI argument helper
      • Ctrl + S: save the current template
      • Ctrl + Plus/Minus: increase/decrease font size
      • Ctrl + Q: quit
    • Tab support:
      • Ctrl + Tab or Ctrl + PageDown: open next tab
      • Ctrl + Shift + Tab or Ctrl + PageUp: open previous tab
      • Ctrl + [1-9]: move to n-th tab
      • Mouse Scroll Up/Down over the tabs: navigate to next or previous tab
      • Ctrl + W or Middle Mouse Button Click: close current tab
    • The template path is auto-updated if the template is saved to a new location
    • The template-id is recommended as file name when saving

    Settings

    • The plugin attempts to auto-detect and complete the configuration values
    • The code searches for the nuclei binary path, using the values from the process’s environmental PATH variable.
      Note: the BurpSuite binary, opposed to the stand-alone BurpSuite jar, might not have access to the current users’s PATH variable.
    • The target template path is calculated based on the default nuclei template directory, configured under <USER_HOME>/.config/nuclei/.templates-config.json
    • The name of the currently logged-in operating system user is used as a default value for the template author configuration

    Look and feel

    • The template generator window supports Dark and Light themes. The presented theme is chosen based on the selected BurpSuite theme, under User Options
    • Support for colored nuclei output
    • Modifiable font size in the template editor and command output

    Building the code

    Use mvn clean package -DskipTests to build the project yourself. It requires Maven 3.x and Java 11+.

    On MacOS the dependencies for the plugin can be met using Homebrew: brew install mvn openjdk@11

    Alternatively, different builds can be downloaded from the Actions section. The built artifact can be found under the latest build’s Artifacts section. These artifacts are generated after every commit, but are only stored for a limited amount of time.

    Installation

    • Build the code yourself or download a pre-built/release version
    • Go to Extender in BurpSuite
    • Click the Add button in the Extensions tab
    • Leave the Extension Type on Java
    • Select the path to the plugin (.jar)

     

  • Kali Linux – The Best Tool For Penetration Testing?

    Kali Linux – The Best Tool For Penetration Testing?

    [ad_1]

    Kali Linux – The Best Tool For Penetration Testing?

    The Best Tool For Penetration Testing ?

    The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing in mind. It is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In this blog post, we will discuss what penetration testing is, why Kali Linux is such a good tool for this activity, and how you can use it to test your own systems. We will also provide some tips for using Kali Linux effectively, and mention some other tools in its category.

    What Is Penetration Testing?

    Penetration testing, often known as “pentesting” or “security testing,” is the art of simulating an attack from a malicious individual to assess the security of a computer system or network. This can be done either manually or automated, and it typically involves trying to exploit vulnerabilities in order to gain access to sensitive data or systems. Penetration tests can be used to test both internal and external systems, and they are often used as part of a larger security assessment.

    Debian is the Linux distribution employed in penetration testing and security auditing. It includes dozens of tools that allow you to perform all sorts of attacks against your targets. In this blog post, we will discuss what penetration testing is, why Kali Linux is such a good tool for this activity, and how you can use it to test your own systems. We’ll show you how to use this Linux distribution efficiently, as well as other tools in the same category.

    Why Is Kali Linux Such a Good Tool for Penetration Testing?

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester.

    Some of the reasons why Kali Linux is such a good tool for penetration testing include:

    – It has a large number of pre-installed security tools, making it easy to get started with penetration testing.

    – Kali Linux is regularly updated with new features and tools.

    It’s easy to use. It’s completely free and may be used on a variety of platforms.

    How to Use Kali Linux for Penetration Testing: A Step-by-Step Guide

    There are a few things to think about before you start using Kali Linux for penetration testing. In particular, you need to choose your targets, gather information about them, and then select the appropriate tools for the job. Let’s look at each of these phases in further depth below.

    Choosing Your Targets

    The first step in any penetration test is choosing your targets. This can be done either manually or automatically, but it is important to make sure that you have permission from the owners of the systems before proceeding. In addition, you need to choose targets that are likely to be vulnerable to the types of attacks that you plan to use.

    Gathering Information

    The next stage is to obtain information about your target. This can include things like network diagrams, system architecture diagrams, and lists of installed software. You should also attempt to learn as much as possible about the individuals who work on the system, including their positions and duties.

    Selecting Tools

    After you have gathered information about your target, it is time to select the appropriate tools for the job. Kali Linux includes dozens of tools that can be used for penetration testing, so it is important to select the right ones for the task at hand. You should be aware of the various sorts of assaults you may make.

    Performing the Attack

    Once you have selected your targets, gathered information about them, and selected the appropriate tools, it is time to start attacking. This can be done in a variety of ways, but typically involves trying to exploit vulnerabilities in order to gain access to sensitive data or systems. Kali Linux includes a number of tools that make this process easy, so be sure to take advantage of them.

    Tips for Using Kali Linux Effectively

    Here are a few tips for using Kali Linux effectively:

    – Be familiar with the different types of attacks that you can perform.

    – Select the appropriate tools for the job.

    – Read the documentation for each tool before using it.

    – Keep your Kali Linux installation up to date.

    Other Tools in This Category

    In addition to Kali Linux, there are a number of other tools that can be used for penetration testing. Some of these include:

    What Does Penetration Testing With Kali Linux Mean?

    How to Install Metasploit on ubuntu 20.04

    How to make Hacking Machine under 7000 in 2021

    Penetration testing with Kali Linux means using the tools and features of Kali Linux to test the security of systems and networks. This can be done either manually or automatically, but it is important to make sure that you have permission from the owners of the systems before proceeding. In addition, you need to choose targets that are likely to be vulnerable to the types of attacks that you plan to use.

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester.

    Conclusion

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester. If you want to use Kali Linux for penetration testing, be sure to familiarize yourself with the different types of attacks that you can perform, and select the appropriate tools for the job.

    [ad_2]

  • A Utility Designed To Aid In Bypassing User-Mode Hooks

    A Utility Designed To Aid In Bypassing User-Mode Hooks

     
    A Utility Designed To Aid In Bypassing User-Mode Hooks

    RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array. After that, there are two techniques that the user can choose to bypass the user-mode hooks.

    Technique-1, reads the NTDLL as a file from C:\Windows\System32\ntdll.dll. After parsing, the .TEXT section of the already loaded NTDLL (where the hooks are performed) in memory is replaced with the .TEXT section of the clean NTDLL.

    In Technique-2, NTDLL reads as Section from KnownDlls, \KnownDlls\ntdll.dll. (beacuse DLL files are cached in KnownDlls as Section.) After parsing, the .TEXT section of the already loaded NTDLL (where the hooks are performed) in memory is replaced with the .TEXT section of the clean NTDLL.

    The detailed flow of the methodology and all techniques is given below:

    How to Use

    You can open and compile the project with Visual Studio. The whole project supports x64 architecture for both Debug and Release modes.

    The RefleXXion-EXE solution generates the EXE for PoC purpose. If you want to understand how the project works step by step, it will make your job easier. Main function contains Technique1 and Technique2 functions definations. Comment one of them and compile. Do not use both functions at the same time.

    The RefleXXion-DLL solution generates the DLL that you inject into the process you want to bypass the user-mode hooks for NTDLL. At the beginning of the main.cpp file, there are definitions of which technique to use. You can choose one of them and compile it. Do not set all values at the same time, set only the one technique you want. Example configuration is given below.

    // Techniques configuration section
    define FROM_DISK 1 // If you set it to 1, the Technique-1 will be used. For more information; https://github.com/hlldz/RefleXXion
    define FROM_KNOWNDLLS 0 // If you set it to 1, the Technique-2 will be used. For more information; https://github.com/hlldz/RefleXXion

    Operational Usage Notes & OPSEC Concerns

    • RefleXXion currently is only supports for x64 architecture.
    • RefleXXion only unhooks NTDLL functions, you may need to unhook other DLLs (kernel32.dll, advapi32.dll etc.) as well. For this, you can easily edit the necessary places in the project.
    • The RefleXXion only uses the RWX memory region when overwriting the .TEXT section process starts. For this process a new memory reginon is not created, the existing memory region (the TEXT section of the NTDLL that is already loaded) is RWXed and then converted to RX.

    ULONG oldProtection;
    ntStatus = NtProtectVirtualMemory(NtCurrentProcess(), &lpBaseAddress, &uSize, PAGE_EXECUTE_READWRITE, &oldProtection);
    memcpy()…
    ntStatus = NtProtectVirtualMemory(NtCurrentProcess(), &lpBaseAddress, &uSize, oldProtection, &oldProtection);

    • P.S. The RefleXXion invokes the NtProtectVirtualMemory API over the cleanly installed NTDLL. It uses the CustomGetProcAddress function for this because the clean NTDLL is not in the In Load Order Module List even though it is loaded into memory. So a solution like here (https://stackoverflow.com/questions/6734095/how-to-get-module-handle-from-func-ptr-in-win32) will not work. That’s why the custom GetProcAddress function exists and is used.
    • You can load RefleXXion DLL from disk to target process. You may not prefer a run like this for sensitive work such as a Red Team operation. Therefore, you can convert the RefleXXion DLL to shellcode using the sRDI project or integrate the RefleXXion code into your own loader or project.
    • Even if NTDLL (as file or as section) is reloaded to the injected process, it does not remain loaded. RefleXXion close all opened handles (file & section handles) for own processes.

     

  • EU accuses Apple of market abuse with NFC and Apple Pay

    EU accuses Apple of market abuse with NFC and Apple Pay

    [ad_1]

    Above a desk somewhere at Apple HQ someone has probably pasted the slogan, “Another week, another lawsuit,” and this week seems no different as the EU is targeting Apple Pay, or to be more specific, how Apple constrains use of the NFC chip inside iPhones.

    What’s the claim?

    The second charge in Europe this year, EU antitrust regulators have alleged that Apple restricts competitors by denying access to the NFC (Near-Field Communications) technology it uses in its mobile wallet.

    Apple has been sent a statement of objections in which regulators detailed how it has abused its dominance position in markets for mobile wallets on iOS in contravention of Article 102 of the TFEU.

    Apple Pay has access to the NFC Input APIs, which the company does not make available to third-party payment firms. However, other platforms do permit third parties to access NFC tech to make such payments.

    The EU statement says it “does not take issue with the online restrictions nor the alleged refusals of access to Apple Pay for specific products of rivals that the Commission announced that it had concerns when it opened the in-depth investigation into Apple’s practices.”

    Both the latter matters were part of the investigation when it began in 2020, allegedly in response to complaints raised by PayPal.

    The case is different from the proposals within the EU Digital Markets Act, which will also affect Apple’s business. Apple is facing scrutiny and regulation in most of its major markets, including the UK, US, Korea, Europe, Japa,n and elsewhere.

    What the EU says

    “In our Statement of Objections, we preliminarily found that Apple may have restricted competition, to the benefit of its own solution Apple Pay. If confirmed, such a conduct would be illegal under our competition rules,” Executive Vice President Margrethe Vestager said in a statement.

    Regulators argue that Apple has significant market power in the mobile device market and dominates mobile wallets. The Commission argues that the company is abusing this power by reserving access to NFC tech on its devices to Apple Pay, to the detriment of competitors and consumers.

    Apple will now have time to examine the allegations and respond to them as part of the ongoing investigation.

    The Statement of Objections should not be confused with being a final judgement — though Vestager has already rejected counterarguments concerning security and regulators seem deaf to the need for user privacy.

    What Apple says

    In a statement provided to me, Apple defended itself, saying: “We designed Apple Pay to provide an easy and secure way for users to digitally present their existing payment cards and for banks and other financial institutions to offer contactless payments for their customers.

    “Apple Pay is only one of many options available to European consumers for making payments and has ensured equal access to NFC while setting industry-leading standards for privacy and security. We will continue to engage with the Commission to ensure European consumers have access to the payment option of their choice in a safe and secure environment.”

    It is worth noting that Apple recently opened the NFC chip to Apple developers for use with Apple’s Tap to Pay feature, which turns iPhones into card readers. This does not yet allow rivals to use the NFC chip to make payments from iPhones. Apple also recently published a report that showed how successful third-party apps could be on its platforms.

    What’s the history?

    Apple really began laying the foundations for payment tech in iPhones years before the 2014 introduction of Apple Pay. In 2010, it acquired contactless/near field communications tech firm, VIVOtech and soon recruited industry expert Benjamin Vigier as its product manager of mobile commerce.

    Vigier was likely a key hire to enable Apple’s plans; he also led development of mobile payment systems for Starbucks and Paypal. That hire wasn’t random. Apple had already filed patents for use of NFC tech by then, and speculation concerning Apple’s plans to hold flight tickets on iPhones had already begun.

    When Apple did launch the service, it did so long behind everyone else, but Apple Pay soon eclipsed that of similar services from Samsung, HTC, and others. It turned out that people making mobile payments wanted brand trust, security, and biometric identity to seal these transactions.

    Since then, Apple Pay has possibly become the most widely used NFC-based payment system in the world; it’s arguable that the iPhone maker has done more than most to break down initial consumer resistance to mobile payment systems.

    Why is this happening?

    Apple is a victim of its own success. When the company introduced the iPod and launched its iTunes ecosystem, it was a small company fighting for survival against Microsoft and others.

    The same basic business plan Apple used with iTunes was subsequently transposed around iPhone and the App Store. Today the company has become the world’s most valuable tech company, which means it is under a different set of rules.

    While before it was a small player fighting for position, today it has become a major firm and must anticipate scrutiny. It must also develop a new approach to this side of its business, while shoring up revenue elsewhere.

    It seems inevitable the mobile payments space would become messy.

    Arguably, most mobile payment systems have failed amid suspicion about the entire sector that emerged in 2010. Apple has built a far deeper currency of trust across its customer base and seems to have bigger ambitions in the financial services space. These ambitions inevitably pit the company against incumbents in the space, so it’s of little surprise to see the regulators getting involved.

    What’s at stake?

    Money. If the EU finds Apple guilty, it could be fined up to 10% of its global turnover, though it is unlikely to be punished to that extent. Apple Pay is used by more than 2,500 banks in Europe along with over 250 challenger banks and fintech services.

    In the background, we also have continued speculation around Apple’s plans to introduce new payment services and to extend Apple Card availability outside the US. Associated with this, we also hear rumors the company may intend to launch an Apple-as-a-service plan.

    What might happen?

    Apple seems ready to fight tooth and claw to protect its strategy of making some features platform specific. Total control of its ecosystem has always been part of its approach, so this is philosophically in keeping with that strategy.

    All the same, the shades of tech regulation cast heavy shadows on the company at this time, and as in any conflict resolution will eventually be reached through a combination of negotiation and regulation.

    This could take years, but the arguments being made elsewhere concerning its ecosystem probably also apply here.

    I think the ultimate question will be how much Apple can charge third-party companies for access to profitable parts of its system without being seen as anti-competitive. And to what extent will regulatory activity dilute the user experience?

    During the course of events, I imagine Apple will attempt to say that those complaining about its business practices in mobile payments are attempting to capitalize on its work, given other attempts to create systems as popular as its own have already failed.

    That argument likely won’t win regulators over to its position, but may help the company justify a right to demand a slice of any future transactions made using its platforms on services provided by third parties. I doubt the latter will get a free ride.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]