Mobile SDK Security: Effective Testing Methodology

In mobile penetration testing, third-party modules or libraries are often considered out of scope for several reasons, although it’s worth noting that the decision to include or exclude third-party components can vary depending on the specific requirements of the assessment […] The post Mobile SDK Security: Effective Testing Methodology appeared ... Read More

Mobile SDK Security: Effective Testing Methodology

In mobile penetration testing, third-party modules or libraries are often considered out of scope for several reasons, although it’s worth noting that the decision to include or exclude third-party components can vary depending on the specific requirements of the assessment […] The post Mobile SDK Security: Effective Testing Methodology appeared ... Read More
weak encryption methodology

How Poor Cryptographic Practices Endanger Banking Software Security

In today’s digital age, financial institutions rely heavily on encryption to protect sensitive data in their banking applications. However, despite the critical role of cryptography, many implementations suffer from fundamental flaws that create a false sense of security. Misconceptions about […] The post How Poor Cryptographic Practices Endanger Banking Software ... Read More
weak encryption methodology

How Poor Cryptographic Practices Endanger Banking Software Security

In today’s digital age, financial institutions rely heavily on encryption to protect sensitive data in their banking applications. However, despite the critical role of cryptography, many implementations suffer from fundamental flaws that create a false sense of security. Misconceptions about […] The post How Poor Cryptographic Practices Endanger Banking Software ... Read More
high-level working of the method

How to Intercept Traffic from Proxy Unaware Application Using DNSChef

In this blog, we will dive into an interesting method for intercepting traffic from applications implementing SSL Pinning and applications that do not respect system proxies. Xamarin, for instance, relies on the Mono runtime, which introduces its network stack instead […] The post How to Intercept Traffic from Proxy Unaware ... Read More