by Xenofon Vassilakopoulos | Sep 27, 2023 |
Introduction In this blog post we will discuss the use of Corellium emulator in Penetration Testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection using frida and r2frida, a plugin for radare2 that allows to instrument...
by Evangelos Ganiaris | Dec 16, 2022 |
What is DLL? In Microsoft Windows, much of the functionality of both the operating system (OS) and third-party applications are provided by Dynamic Link Library (DLL) binaries. DLL files are Microsoft’s interpretation of the shared library concept. Instead of shipping...
by Andrei Grigoras | Nov 18, 2022 |
Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
by Athan Georgopoulos | Sep 30, 2022 |
As we announced at the Beyond exhibition today, in our effort to contribute at the cybersecurity community we offer in a first come, first served basis a gratis Application Security Assessment for start- ups with a maximum income of €250,000. This is our contribution...
by Xenofon Vassilakopoulos | Jan 21, 2022 |
Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and...