Blog
Home / Blog

IOS Architecture
All Apple mobile devices, including the iPhone, iPad, and iPod, run on iOS, a platform jointly developed with the Darwin foundation. With iOS, the hardware

Re-entrancy attacks in smart contracts
What is a Smart Contract? A smart contract is a computer application or a transaction protocol that is designed to execute, control, or document legally

Intro to BEFF Framework
Hey everyone, in this blog, we will be discussing about BeEF, which is short for The Browser Exploitation Framework, and some attacks that can be

Bypass SSL Pinning on IOS Application
In this blog we are going to bypass SSL pinning on iOS devices, and test it on a vulnerable application aka DVIA V2. One of

Android Tapjacking Vulnerability
In this blog, we are going to talk about Tapjacking and how it operates. In addition to that, we are going to learn about free-floating

PLC Hacking (Pt. 2)
Welcome to Part 2 of our “PLC Hacking series”. In our previous blog, we covered setting up our Koyo CLICK PLC and writing our first

IOS Jailbreaking
In this blog, we are going to discuss jailbreaking, its advantages and disadvantages, as well as types and the steps for carrying out a successful

PLC Hacking (Pt. 1)
Programmable Logic Controllers (PLCs) are industrial computers used to control different electro-mechanical processes for use in manufacturing, plants, or other automation environments. PLCs can range

Broken Cryptography in Android Applications
In this blog we are going to discuss Broken Cryptography in Android Applications. When application developers wish to use encryption in their apps, they have

Raspberry PI Pentest Dropbox
There are situations where On-site penetration testing is not always feasible. It’s better to go for a remote “pentest dropbox” in such cases. The pentest

Android Pentesting Methodology (Pt. 3)
Part 1 of “Android Pentesting Methodology” covered Android architecture. Part 2 covered APKs, basic app reversing, and popular debugging tools. In this blog post (part

Android Pentesting Methodology (Pt. 2)
In part 1 of the “Android Pentesting Methodology” series, we briefly discussed the Android architecture. In part 2 of the same series, we’re going to