Bypass SSL pinning on iOS Application

In this blog we are going to bypass SSL pinning on iOS devices, and test it on a vulnerable application aka DVIA V2. One of the most important aspects of the whole design and development process for mobile apps has always been security. This alone has the power to create or ruin an app empire’s...

Android Tapjacking Vulnerability

In this blog, we are going to talk about Tapjacking and how it operates. In addition to that, we are going to learn about free-floating windows.  The Android operating system is based on the Linux operating system and was designed with great aspirations. Android is typically seen to be at least as secure as a...

PLC Hacking (Pt. 2)

Welcome to Part 2 of our “PLC Hacking series”. In our previous blog, we covered setting up our Koyo CLICK PLC and writing our first ladder logic program into the PLC. Here, we are going to learn about overriding PLC data from remote sources and discuss how different industrial communication protocols like Modbus TCP and...

iOS Jailbreaking

In this blog, we are going to discuss jailbreaking, its advantages and disadvantages, as well as types and the steps for carrying out a successful jailbreak.  The technique of circumventing a smart device’s internal defenses to get total control of the operating system is known as rooting or jailbreaking, but it puts the device’s security...