by George Roumeliotis | May 23, 2025 |
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like a vaccine introduces a weakened form of a virus to train your immune...
by George Roumeliotis | Feb 2, 2024 |
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability, identified in versions 1.3 to 1.9, 1.10.0 to 1.10.29, and 1.11.0 to 1.11.8,...
by Xenofon Vassilakopoulos | Oct 10, 2023 |
Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
by Xenofon Vassilakopoulos | Sep 27, 2023 |
Introduction In this blog post we will discuss the use of Corellium emulator in Penetration Testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection using frida and r2frida, a plugin for radare2 that allows to instrument...
by George Karagiannidis | Oct 19, 2020 |
Following the blogposts that identified entry & mid-level resources for the penetration testing professional we will end this series with a list of advanced resources. If you haven’t read the two previous posts, we highly recommend to do so in order to get a more...