Blog
Home / Blog

Blockchain 101
A blockchain is a shared distributed ledger between computer network nodes. It serves as an electronic database for storing data in digital form. Blockchain keeps

JWT Authentication Bypass
What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind

Insecure Deserialization in Java
Our previous blogs covered Insecure Deserialization in PHP and Python. In this blog (the third in our “Insecure Deserialization” series), we’ll take a glance at

Intro to Software Reverse Engineering (Part 3)
Hey everyone! In the previous blog (part 2 of the “Intro to Software Reverse Engineering”), we covered a walk-through of a challenge from crackmes.one. We’ll

Intro to Software Reverse Engineering (Part 2)
In our previous blog (part 1 of the “Intro to Software Reverse Engineering” series), we covered the basics of Reverse Engineering. In this blog (part

Insecure Deserialization in Python
In this blog (part of the “Insecure Deserialization” series), we are going to discuss Insecure Deserialization in Python. We briefly discussed “What is Serialization?” and

Intro to Software Reverse Engineering – Part 1
Software Reverse Engineering is the process through which one attempts to understand a program’s functionality by analyzing its code. In this blog (part 1 of

Insecure Deserialization in PHP
In this blog (part of the “Insecure Deserialization” series), we will discuss insecure deserialization vulnerabilities in PHP and its prevention. The purpose of data serialization

Sensitive Data Exposure in Local Storage IOS
In this blog, we are going to demonstrate how to examine and detect potential security risks in an iOS application based on a Local Data

IOS Architecture
All Apple mobile devices, including the iPhone, iPad, and iPod, run on iOS, a platform jointly developed with the Darwin foundation. With iOS, the hardware

Re-entrancy attacks in smart contracts
What is a Smart Contract? A smart contract is a computer application or a transaction protocol that is designed to execute, control, or document legally

Intro to BEFF Framework
Hey everyone, in this blog, we will be discussing about BeEF, which is short for The Browser Exploitation Framework, and some attacks that can be