Blog
May 16, 2013
Part 2: Quick and Useful Tricks for Analyzing Binaries for Pen Testers
[Editor's Note: In his previous blog post, Yori Kvitchko provided a bunch of tips penetration testers could use to analyze binary files, focusing on network communications. This time around, Yori looks at application data files, a hugely important source of information that could include passwords,...