Doing Adnroid Reconnaisance in Pen Testing.
THis slide specifically focus on the following methodology:
- Retrieving Android App Info via drozer
- Network Capturing by tcpdump + netcat + wireshark or OWASP ZAP
This document introduces Shinobu Okano, an Android engineer at Mercari who maintains several open source projects on GitHub related to uploading screenshots and files to Slack from an Android app. It provides links to Okano's Meteor library for uploading files to Slack, Meteoroid library for taking screenshots from notifications, and Meteorite library for uploading screenshots to Slack, along with a link to a demo of these libraries in use.
HR Meetup Tokyo vol.1 Akihiro Matsuo @Mercari, Inc.Mercari, Inc.
?
Mercari is an e-commerce platform that allows anyone to buy and sell goods. The company's mission is to create value in a global marketplace. This document discusses mercan, Mercari's internal content platform, which aims to connect and reach potential candidates by sharing interviews with employees and board members, blogs, event reports, and other media like podcasts and presentations. The goal of mercan is to showcase what makes Mercari an attractive company and employer.
The world of recruiting is evolving at an accelerated pace. Recruiting teams at the leading edge of this evolution are deploying modern tools and technology like algorithms, bots, and AI to help them identify, engage, and retain talent. However, many companies still struggle with the fundamentals of recruiting, which is creating a widening gap in capabilities…and successes.
This e-book is not for those practitioners already at the leading edge of this curve. This is a resource for recruiters with a full desk and heavy requisition loads who perpetually struggle for time. Startups without established recruiting or HR functions and are wondering what to do to give their organization a hiring edge. Teams that started modernizing their recruiting functions, but soon found themselves stuck.
In the following pages, you’ll learn about three aspects of modern recruiting that should be core components of your recruiting efforts in 2017, including examples and actionable takeaways to help you level up your recruiting.
以前に、”スタートアップの経営者?人事向け「あの時、採用面でやっておけば良かったこと(成長フェーズ別)」”というタイトルでスタートアップの採用活動についてまとめました。
前回の記事では、「ああ、こんなことをやっておけば良かった」というNice to Haveをベースに整理したのですが、今回はスタートアップが成長フェーズ別に取り組むべき採用課題、あるいは自分が取り組んできた採用課題について整理してまとめてみました。それでは創業期からフェーズ別に進めていきます。
Why and How should you approach to Android Security in architecting phase, implementation phase, and operation phase.
This includes what type of secure planning should be considered in term of business domain, what type of universal secure coding should be done. It also talks about how should you store keystores and its password in safe manner.
The world of recruiting is evolving at an accelerated pace. Recruiting teams at the leading edge of this evolution are deploying modern tools and technology like algorithms, bots, and AI to help them identify, engage, and retain talent. However, many companies still struggle with the fundamentals of recruiting, which is creating a widening gap in capabilities…and successes.
This e-book is not for those practitioners already at the leading edge of this curve. This is a resource for recruiters with a full desk and heavy requisition loads who perpetually struggle for time. Startups without established recruiting or HR functions and are wondering what to do to give their organization a hiring edge. Teams that started modernizing their recruiting functions, but soon found themselves stuck.
In the following pages, you’ll learn about three aspects of modern recruiting that should be core components of your recruiting efforts in 2017, including examples and actionable takeaways to help you level up your recruiting.
以前に、”スタートアップの経営者?人事向け「あの時、採用面でやっておけば良かったこと(成長フェーズ別)」”というタイトルでスタートアップの採用活動についてまとめました。
前回の記事では、「ああ、こんなことをやっておけば良かった」というNice to Haveをベースに整理したのですが、今回はスタートアップが成長フェーズ別に取り組むべき採用課題、あるいは自分が取り組んできた採用課題について整理してまとめてみました。それでは創業期からフェーズ別に進めていきます。
Why and How should you approach to Android Security in architecting phase, implementation phase, and operation phase.
This includes what type of secure planning should be considered in term of business domain, what type of universal secure coding should be done. It also talks about how should you store keystores and its password in safe manner.