Sensitive Data Exposure in Local Storage iOS

In this blog, we are going to demonstrate how to examine and detect potential security risks in an iOS application based on a Local Data storage evaluation. So, Let’s get this party started. The following are some ways of storing data on a device: Property List files CoreData and SQLite databases NSUserDefaults Stores Insecure Data...

iOS Architecture

iOSJuly 24, 2022iOS Architecture

All Apple mobile devices, including the iPhone, iPad, and iPod, run on iOS, a platform jointly developed with the Darwin foundation.  With iOS, the hardware device is managed and the technology needed to create applications for the platform is provided, unlike other significant operating systems.  A few commonly used system apps are included as part...

Reentrancy Attacks in Smart Contracts

What is a Smart Contract? A smart contract is a computer application or a transaction protocol that is designed to execute, control, or document legally significant events and activities in accordance with the conditions of a contract or agreement.  The goals of smart contracts are to reduce the need for trusted intermediaries, arbitration and enforcement...

Intro to BeEF Framework

Hey everyone, in this blog, we will be discussing about BeEF, which is short for The Browser Exploitation Framework, and some attacks that can be performed using the framework. BeEF is a penetration testing tool that focuses on the web browser. It is designed to perform client-side attacks, specifically targeting web browsers. It’s an open-source...