Blog Archive 2018 Apr 19 Releasing Damn Vulnerable iOS App v2.0 - written in Swift 2016 Jun 23 iOS Application Security Part 46 - App Transport Security 2015 May 31 iOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS app version 1.5 May 23 iOS Application Security Part 44 - Bypassing Jailbreak detection using Xcon May 17 iOS Application Security Part 43 - FAT binaries & LLDB usage continued May 12 iOS Application Security Part 42 - LLDB Usage continued Apr 28 iOS Application Security Part 41 - Debugging applications using LLDB Apr 28 iOS Application Security Part 40 - Testing apps on your Mac Apr 03 Damn Vulnerable iOS App solutions free for download Mar 29 Android Application hacking with Insecure Bank Part 4 Mar 28 Android Application hacking with Insecure Bank Part 3 Mar 24 iOS Application Security Part 39 – Sensitive information in memory Mar 23 Android Application hacking with Insecure Bank Part 2 Jan 24 iOS Application Security Part 38 - Attacking apps using Parse (Guest Lecture by Egor Tolstoy) 2014 Dec 20 iOS Application Security Part 37 - Adapting to iOS 8 Dec 01 Damn Vulnerable iOS App v1.4 launched Nov 24 Android Application hacking with Insecure Bank Part 1 Nov 03 iOS Application Security Part 36 – Bypassing certificate pinning using SSL Kill switch Oct 27 Wifite Walkthrough part 2: Cracking WPA access points Oct 27 Wifite Walkthrough part 1: Cracking WEP access points Oct 18 iOS Application Security Part 35 – Auditing iOS Applications With iDB Apr 18 iOS Application Security Part 34 - Tracing Method calls using Logify Apr 18 iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate) Mar 25 iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET) Mar 18 iOS Application Security Part 31 - The problem with using third party libraries for securing your apps Mar 12 How to distribute IPA file for jailbroken devices Mar 07 iOS Application Security Part 30 - Attacking URL schemes Mar 06 GDB segmentation fault issue fix with jailbroken device Jan 17 iOS Application Security Part 29 - Insecure or Broken Cryptography Jan 17 iOS Application Security Part 28 - Patching iOS Application with Hopper Jan 17 iOS Application Security Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak 2013 Dec 17 iOS Application Security Part 26 – Patching iOS Applications using IDA Pro and Hex Fiend Dec 17 iOS Application Security Part 25 – Secure Coding Practices for iOS Development Dec 17 iOS Application Security Part 24 – Jailbreak Detection and Evasion Dec 17 iOS Application Security Part 23 – Defending against runtime analysis and manipulation Dec 17 iOS Application Security Part 22 – Runtime Analysis and Manipulation using GDB Nov 08 iOS Application Security Part 21 – ARM and GDB Basics Oct 26 iOS Application Security Part 20 – Local Data Storage (NSUserDefaults Oct 26 iOS Application Security Part 19 – Programmatical Usage of Introspy Sep 26 IOS Dev - Encrypting images and saving them in App Sandbox Sep 26 iOS Application Security Part 18 – Detecting custom signatures with Introspy Sep 23 iOS Application Security Part 17 – Black-Box Assessment of iOS Applications using INTROSPY Sep 17 IOS Dev - Storing Info in Keychain with NSUserDefaults like syntax Sep 17 iOS Application Security Part 16 – Runtime Analysis of iOS Applications using iNalyzer Sep 17 iOS Application Security Part 15 – Static Analysis of iOS Applications using iNalyzer Sep 17 iOS Application Security Part 14 – Gathering information using Sogeti Data Protection tools Sep 17 iOS Application Security Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools Aug 29 Mind over Body ! Stok Kangri Summit Day 16,300 ft -> 20,187 ft -> 16,300 ft Aug 23 What to expect from the new iPhone (5S/5C) - Rumor roundup Aug 20 iOS Application Security Part 12 – Dumping Keychain Data Aug 20 iOS Application Security Part 11 – Analyzing Network Traffic over HTTP/HTTPS Aug 20 iOS Application Security Part 10 – iOS Filesystem and Forensics Aug 20 iOS Application Security Part 9 – Analyzing Security of iOS Applications using Snoop-it Jul 25 iOS Application Security Part 8 - Method Swizzling using Cycript Jul 25 iOS Application Security Part 7 - Installing and Running Custom Applications on Device without a registered developer account Jul 25 iOS Application Security Part 6 - New Security Features in iOS 7 Jul 10 IOS 7 Beta 3 : Some bugs that i want Apple to Fix ! Jul 02 iOS Application security Part 5 – Advanced Runtime analysis and manipulation using Cycript (Yahoo Weather App) Jul 02 iOS Appllication Security Part 4 – Runtime Analysis Using Cycript (Yahoo Weather App) Jun 30 Octopress: Category pages with preview and pagination Jun 21 Pagination in Restkit 0.2 using RKPaginator Jun 19 Burpsuite Walkthrough Jun 18 Everything about Mount Everest 1/50 - George Mallory and Andrew Irvine Jun 16 iOS Application security Part 3 - Understanding the Objective-C Runtime Jun 16 iOS Application security Part 2 - Getting class information of iOS apps Jun 16 iOS Application security Part 1 - Setting up a mobile pentesting platform Jun 15 Ghost USB Honeypot Part 2 - Installing and running the honeypot Jun 15 Ghost USB Honeypot Part 1- Interview with Project Leader Sebastian Poeplau Jun 15 Backtrack 5 R3 Walkthrough part 4 Jun 15 Backtrack 5 R3 Walkthrough part 3 Jun 15 Backtrack 5 R3 Walkthrough part 2 Jun 15 Backtrack 5 R3 Walkthrough part 1 Jun 15 Defcon 20 Day 3 Review Jun 15 Defcon 20 Day 2 Review Jun 15 Defcon 20 Day 1 Review Jun 15 A New DNS Exploitation technique - Ghost domain names Jun 13 Abusing Social Networking Sites to Perform Content Forgery Jun 13 Circumventing NAT using UDP hole punching Jun 13 Scanning the web with Ammonite Jun 13 Inserting Vulnerabilities in Web Applications Jun 13 w3af walkthrough and tutorial part 4 - w3af tools Jun 13 w3af walkthrough and tutorial part 3 - Remaining plugins Jun 13 w3af walkthrough and tutorial part 2 - Discovery and Audit plugins Jun 13 W3af walkthrough Part 1 Jun 13 Defending the Internet with Project Meshnet Jun 12 Timing Analysis Attacks in Anonymous Systems Jun 12 Hacking Web Authentication – Part 2 Jun 12 Hacking Web Authentication – Part 1 Jun 12 KARMETASPLOIT Jun 12 Abusing IP Protocols to Create Covert Channels when Penetration Testing Jun 09 DNS Hacking - Beginner to Advanced
Mar 25 iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
Mar 18 iOS Application Security Part 31 - The problem with using third party libraries for securing your apps
Jan 17 iOS Application Security Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak
Sep 17 iOS Application Security Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools
Jul 25 iOS Application Security Part 7 - Installing and Running Custom Applications on Device without a registered developer account
Jul 02 iOS Application security Part 5 – Advanced Runtime analysis and manipulation using Cycript (Yahoo Weather App)