« 2020/10 »

  • 1
  • 2
  • 3

SKT 모바일 Tworld로 선택약정할인 가입 신청하기 

·         T world - Android

·         Tworld 앱 실행

·         선택약정할인 신청

·         선택약정할인 확인하기

·         가입 완료 알림


Posted by codedragon codedragon

댓글을 달아 주세요




Realm ()

·         SQLite, OrmLite, greenDAO, Core Data REST API 통해서 데이터를 관리하는 방법을 개선하기 위해 개발된 오픈소스 모바일 데이터베이스

·         모바일 데이터 베이스로 안드로이드의 SQLite, iOS Core Data 대체해서 있습니다.

·         간결하고 짧은 코드로 속도가 빠른 앱을 만들 있습니다.

·         자바 객체를 해석해서 그 객체의 데이터를 그대로 저장, 획득할 수 있습니다.





'Development > Database' 카테고리의 다른 글

메타데이터(Meta Data)  (0) 2018.10.08
dbdiagram.io - 온라인 ERD 도구  (0) 2018.10.02
Realm - 오픈소스 모바일 데이터베이스  (0) 2018.09.25
CAP 정의, CAP theorem, 브루어 정리(Brewer’s theorem)  (0) 2018.09.17
VLDB(very large data base)  (0) 2018.09.01
DBClient  (0) 2018.08.26
Posted by codedragon codedragon

댓글을 달아 주세요



Android Studio (안드로이드 스튜디오)

  • 2013년 5월 16일 구글 I/O 컨퍼런스에서 구글의 제품 관리자 Ellie Powers에 의해서 발표
  • 2014 12 8 1.0버전 공개 Android 공식 개발 도구로 지정되었습니다.
  • 구글이 만든 IDE로, 젯브레인사(JetBrains) 만튼 인텔리J(IntelliJ)라는 오픈소스 IDE를 활용해 개발되었습니다.
  • 멀티스크린 개발에 유용(가상 디바이스 적절히 이용 가능)
  • 지능형 코드 편집, 사용자 인터페이스(UI) 디자인 툴, 성능 분석 기능 등이 포함되어 안드로이드 개발에 최적화되어 있습니다.
  • 안드로이드 설치 안드로이드 SDK 함께 설치됩니다.
  • Android Studio 3.0 부터 Kotlin 관련도구들도 포함되어 집니다.




Develop >>> Tools 이동




다운로드 녹색버튼 클릭


I have read and agree with the above terms and conditions 체크






Posted by codedragon codedragon

댓글을 달아 주세요



HOWTO – iPhone Forensics with free and-or open source tools – 9-14-11 – viaForensics « viaForensics







iPhone Forensics with F/OSS ### A HOWTO for iPhone Forensics with free and/or open source tools Qualifications

Presentation Goals

iPhone Forensics with F/OSS tools • Commercial Tools exist but there are a growing number of F/OSS tools

• A Mac (OSX) or Linux workstation is used for many of these programs

• Focus on step-by-step examples Open source (MIT) iPhone backup analyzer by Mario Picci (http://ipbackupanalyzer.com/) • Decodes files, presents in a hierarchical view, has some search and conversions

• Plist files are shown (binary plist files are automatically converted in ascii format)

• Image files are shown

• SQLite files are shown with the list of the tables they contain. By clicking on the tables list the selected table's content is dumped in the main UI

• Unknown data files are shown as hex/ASCII data iTunes Backup Directories

Mac Os X: /Library/Application Support/MobileSync/Backup/

Windows XP: \Documents and Settings\(username)\Application Data\Apple Computer\MobileSync\Backup\

Windows Vista, Windows 7: \Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup\

Linux Install

On Ubuntu Workstation


sudo apt-get update

sudo apt-get install python-tk python-imaging python-imaging-tk git

Install pyttk

- Download: http://pypi.python.org/pypi/pyttk/

- Extract: tar xzvf pyttk-0.3.2.tar.gz

- cd pyttk-0.3.2/

- Install: sudo python setup.py install

git clone git://github.com/PicciMario/iPhone-Backup-Analyzer

cd iPhone-Backup-Analyzer/

./main.py -d ~/Desktop/8737684969e72eccf5ff0cafed21b15ec1cb6d4d/

Zdziarski's iOS forensic tools

Free for qualified law enforcement and government agencies • Based on F/OSS software and research (Cyanide, etc)

• Physical acquisition

• Logical acquisition

• PIN bypass

• Decrypts the encrypted files / slice

– iOS 3.x: fully decrypt slice, gets unallocated

– iOS 4.x: decrypts files, not unallocated (mostly)

• Decrypt Keychain

• Working on recovering deleted keys

with F/OSS

• @0naj iphone-dataprotection tools (Python and C)

– Brute force PIN code on device

– Recover device encryption keys

– Decrypt the keychain, all dataprotection encrypted files

– Scrape the HFS journal for deleted content

– Decrypt the entire raw disk

– Included with Jonathan Zdziarski's toolset, or available separately to developers:


Mount the dmg image read-only (Linux)

• Determine file system offset in dd image:

• Mount HFS partition read only:

• Make sure file system was mounted

• Can check disk usage

• The Sleuth Kit by Brian Carrier

– Brain author of excellent book File System Forensics Analysis (FSFA)

– Actively maintained, just released 3.2.2 (06/13/2011)

– Supports NTFS, FAT, UFS 1, UFS 2, EXT2FS, EXT3FS, and ISO 9660


• Install:

• Programs to start with:

– mmls – Media Management ls, generally partition info:

• fsstat – File system info

• fls – Forensic list

– Power utility which can list allocated/deleted files

– Provides offset so recovery is possible

– Build MACB for timeline analysis

– analyst@ubuntu:/mnt/hgfs/Desktop$ fls -z CST6CDT -s 0 -m '/' -f hfs -r -i raw iPhone-3g-313.dmg > ~/iPhone-timeline.body

human friendly

• analyst@ubuntu:/mnt/hgfs/Desktop$ mactime -b ~/iPhone-timeline.body -z CST6CDT -d > ~/iPhone-timeline.csv

– Takes body file and turns into CSV or other format


• Kristinn Gudjonsson developed this software

– Written in Perl (trying to convince him to move to Python)

– Extracts timeline artifacts from many file types including

• Evt/extx, registry, $MFT, prefetch, browser history, etc. (46 and climbing)

– 10+ export formats

http://log2timeline.net/ • Install log2timeline on Ubuntu 10.10 (lucid)

– sudo add-apt-repository "deb http://log2timeline.net/pub/ lucid main"

– wget -q http://log2timeline.net/gpg.asc -O- | sudo apt-key add -

– sudo apt-get update

– sudo apt-get install log2timeline-perl


• sudo timescanner -d /home/analyst/mnt/hfs/ -z CST6CDT -w ~/iPhone-log2timeline.csv

– 218 artifacts (either files or directories).

– Run time of the script 24 seconds. • If you output in body format, can combine with TSK's fls output and generate full timeline of file system and file metadata (sometimes referred to as a "Super Timeline"


• Download scalpel src at:

• wget http://www.digitalforensicssolutions.com/Scalpel/scalpel-2.0.tar.gz

• Compile

– tar xzvf scalpel-2.0.tar.gz

– cd scalpel-2.0/

– sudo apt-get install libtre-dev libtre5

– ./configure; make

– sudo cp scalpel /usr/local/bin • Run scalpel

$ scalpel -c ~/scalpel.conf iPhone-3g-313.dmg • Examine data in "scalpel-output" directory

Sample scalpel.conf


• Usage:

$ xxd iPhone-3g-313.dmg | less • To auto skip 0's:

$ xxd -a iPhone-3g-313.dmg | less Hex editor

• Usage:

$ hexedit iPhone-3g-313.dmg • Once in hex editor:

– "/" = search hex/ASCII string (in "hexedit" use tab to change between ASCII and hex searches)

– q = exit hex editor

– h = help • Can quickly locate potential evidence • Other tools also available (hexeditor and many others) Grep Command

• Searches through a file (or many files/folders) for a specified keyword(s) • Grep is case sensitive by default

$ grep amr iPhone-3g-313.dmg • To do case-insensitive (more time consuming):

$ grep –i AmR iPhone-3g-313.dmg • Can search for a phrase in quotes

$ grep "Trace File" iPhone-3g-313.dmg

$ grep -a "Trace File" iPhone-3g-313.dmg

$ grep -a -A 1 -B 1 "Trace File" iPhone-3g-313.dmg

Grep Command (continued)

• Can also be used to search through many files • Grep through all files in a user's home directory for "viaF": analyst@ubuntu:~$ grep -R 312493 *

Binary file scalpel-output/sqlitedb-9-0/00001.db matches

Binary file scalpel-output/sqlitedb-9-0/00017.db matches Find all sms database files from iPhone (after scalpel)

analyst@ubuntu:~$ grep -R svc_center sqlite* "Strings" Command

• Strings is a powerful utility to extract ASCII or Unicode strings from binary data • Can be run against a file or a full disk image

$ strings iPhone-3g-313.dmg > iPhone.str

$ strings iPhone-3g-313.dmg | less • Can also search for Unicode

$ strings -e b iPhone-3g-313.dmg | less "Strings" does more than ASCII

• Strings is designed to extract ASCII and Unicode

– 7-bit ASCII, 8-bit ASCII

– 16-bit big-endian and little-endian

– 32-bit big-endian and little-endian • From the strings manual page:

Decrypting data – step 1

• Scenario: imaged iPhone and application has encrypted data which you need to view. • Our solution (but other approaches may work)

• Noted app data was encrypted

• Analyzed symbol table for app, saw entries such as:

• 00091033 t -[NSData(AESAdditions) AES256DecryptWithKey:]

• 00092015 t -[NSData(AESAdditions) AES256EncryptWithKey:]

• 0009aA07e t -[NSData(AESAdditions) keyBytes:]

• 00034261 t +[NSData(Base64) dataFromBase64String:]

• 00034410 t -[NSData(Base64) base64EncodedString] • Determined app stored key in Keychain so cracked the key chain, found an entry with a Base64 encoded key

• Decoded Base64 key

• Wrote quick program that used "AES256DecryptWithKey" API, encrypted file and decode AES encryption key to access data • F/OSS Tools used:

• Zdziarski's techniques to physically image device, crack keychain

• Strings to determine encryption technique

• XCode from Apple to write decrypt program Andrew Hoog

Chief Investigative Officer

ahoog@viaforensics.com http://viaforensics.com

Main Office:

1000 Lake St, Suite 203

Oak Park, IL 60301

Tel: 312-878-1100 | Fax: 312-268-7281


출처: <https://www.nowsecure.com/blog/2011/10/20/howto-iphone-forensics-free-andor-open-source-tools-91411/>





직접 다운로드


Posted by codedragon codedragon

댓글을 달아 주세요



해당 프로젝트 페이지의 왼쪽 창 메뉴에서 결제 및 설정 링크 클릭 >>>

프로젝트 삭제 클릭


빨간 색으로 된 프로젝트ID 입력 >>>

프로젝트 삭제 버튼 클릭


해당 프로젝트 삭제완료!!!



해당 개발자 메일로 프로젝트가 삭제되었음을 알리는 메일도 발송되어 집니다.



삭제된 프로젝트는 일정 기간안에는 복구할 수 있습니다.


Posted by codedragon codedragon

댓글을 달아 주세요



gradle download






gradle-x.x.x-bin.zip 파일 클릭







경로 환경변수에 추가

설치경로 시스템 환경변수의 path에 추가

Posted by codedragon codedragon

댓글을 달아 주세요



디바이스 다시 연결하기-adb.exe 재시작 (디바이스 재접속), Android Studio


adb를 종료시키면 adb가 재시작되면서 디바이스를 서치하여 재접속하게 됩니다.


작업관리자 실행


adb.exe선택 >>> 마우스 우클릭 >>> 작업 끝내기



연결 접속을 시도하고 있는 것을 확인할 수 있습니다.



디바이스에서 확인버튼 터치


개발PC와 디바이스가 다시 연결되었습니다.




Posted by codedragon codedragon

댓글을 달아 주세요


JSON-RPC 자바용 라이브러리 jar 파일 (Server)





Posted by codedragon codedragon

댓글을 달아 주세요


JSON-RPC 자바용 라이브러리 .jar 파일 (Client)





Posted by codedragon codedragon

댓글을 달아 주세요




JSON으로 인코딩된 원격 프로시저 호출 라이브러리


more implementations 클릭


Java로 이동



Google Web Engine을 이용해서 json-rpc를 사용하기 위해서 필요한 라이브러리 파일











JSON-RPC 자바용 라이브러리 jar 파일 (Client)



JSON-RPC 자바용 라이브러리 jar 파일 (Server)





java에서 로그를 출력하기 위한 Library입니다.



Posted by codedragon codedragon

댓글을 달아 주세요