Advanced Frida Usage Part 6 – Utilising writers

Advanced Frida Usage Part 6 – Utilising writers

| | Frida, Uncategorized
Introduction Welcome to another blog post in our series on Advanced Frida Usage. We have covered a lot of features already but we still haven’t mentioned really important one and that is ...
Advanced Frida Usage Part 4 – Sniffing location data from locationd in iOS

Advanced Frida Usage Part 4 – Sniffing location data from locationd in iOS

| | Frida
Introduction Welcome to Part 4 of our Advanced Frida Usage series. In part three of our Frida blog posts, we went over what is XPC, how to use it, and how to ...
Advanced Frida Usage Part 3 – Inspecting XPC Calls

Advanced Frida Usage Part 3 – Inspecting XPC Calls

| | Frida
Introduction In the last two blogs, we have discussed briefly how we can use Frida with applications, today we will cover briefly how to do that with the system binaries. Before we ...
ARM64 Reversing And Exploitation Part 4 – Using mprotect() to bypass NX Protection | 8kSec Blogs

ARM64 Reversing And Exploitation Part 4 – Using mprotect() to bypass NX Protection | 8kSec Blogs

Introduction Hello everyone! In this blog post, we’ll be exploring how to use mprotect() to bypass NX protection on ARM64. But before we get into the details, there are a few things ...
Android SELinux Internals Part I | 8kSec Blogs

Android SELinux Internals Part I | 8kSec Blogs

This is part I of a 2 part series on Android SELinux Internals where we will do a deepdive into the world of SELinux on Android and understand its inner workings, along ...
iOS Deep Link attacks Part 2 – Exploitation | 8kSec Blogs

iOS Deep Link attacks Part 2 – Exploitation | 8kSec Blogs

In Part 2 of this series on iOS Deep Link attacks, we will explore how to identify different vulnerabilities on iOS Deep Link and the technical demonstration to exploit them. If you ...
Advanced Frida Usage Part 2 – Analyzing Signal and Telegram messages on iOS | 8kSec Blogs

Advanced Frida Usage Part 2 – Analyzing Signal and Telegram messages on iOS | 8kSec Blogs

Introduction In this blog post, we will explore the message objects in two popular chat applications: Signal and Telegram. We’ll take similar technical approaches to analyze them, and also learn how to ...
ios-deeplink1

iOS Deep Link Attacks Part 1 – Introduction | 8kSec Blogs

Introduction In Part 1 of this series on iOS Deep link attacks, we will explore how to recognize various types of deep link schemas used in iOS apps and identify potential vulnerabilities ...
Advanced Frida Usage Part 1 – iOS Encryption Libraries | 8kSec Blogs

Advanced Frida Usage Part 1 – iOS Encryption Libraries | 8kSec Blogs

Introduction Welcome to Part 1 of Advanced Frida Series. In this series, we will look at how we can unleash the power of Frida to do some advanced analysis of apps and ...
(More) Common Security Mistakes when Developing Swift Apps – Part II

(More) Common Security Mistakes when Developing Swift Apps – Part II

In my post last week I shared common security mistakes developers make when building Swift applications – covering insecure data storage, symmetric key algorithms, insecure communication and more. If you haven’t read ...