OUR BLOG
Bypassing anti-reversing defences in iOS applications
Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
iOS Instrumentation using Corellium, frida and r2frida
Introduction In this blog post we will discuss the use of Corellium emulator in Penetration Testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection using frida and r2frida, a plugin for radare2 that allows to instrument...
DLL Side Loading
What is DLL? In Microsoft Windows, much of the functionality of both the operating system (OS) and third-party applications are provided by Dynamic Link Library (DLL) binaries. DLL files are Microsoft’s interpretation of the shared library concept. Instead of shipping...
Basic knowledge to get started with Penetration Testing
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228)
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...
EU GDPR vs Virginia CDPA
This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia Governor signed the Consumer Data Protection Act (CDPA) into law. The CDPA...