Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. Leveraging several of these NTLM relay primitives, specifically ...
The Critical Need to Defend Against Unauthorized Apps

The Critical Need to Defend Against Unauthorized Apps

Safeguarding Security and Integrity: In today's digital landscape, mobile applications have become integral to our daily lives, offering convenience, entertainment, and essential services. However, with the rise of mobile app usage, there's ...
View Disassembly and Pseudocode Windows Synchronize Side-by-Side In IDA Pro [ Patreon Unlocked ]

Uncovering RPC Servers through Windows API Analysis

IntroHave you ever tried to reverse a simple Win32 API? If not, let’s look at one together today! This article serves as a hand-holding walkthrough and documents in detail how I analyzed ...
ChatGPT and API Security

ChatGPT and API Security

First of all, this blog was written by a human being! Now that that's out of the way,  let's get onto our main topic for today which is to take a look ...
How to Prevent API Abuse on Mobile Apps

How to Prevent API Abuse on Mobile Apps

API abuse is a growing concern in today's digital landscape, with criminals finding new and innovative ways to exploit APIs for their own gain. According to a recent study by Salt Security, ...
Securing Mobile Gambling Platforms

Securing Mobile Gambling Platforms

Gambling has come a long way since the days of visiting a bricks and mortar outlet and filling in some paperwork to bet on a small set of events and outcomes. Recent ...
How Do I Protect My Flutter App?

How Do I Protect My Flutter App?

Google’s open source Flutter has quickly become one of the most popular development toolkits for building cross platform mobile applications. In this article we will examine what security is built-in to Flutter ...
What is Bot Protection?

What is Bot Protection?

If you're a mobile app developer, chances are you've heard of bot protection. Bots are programs that run automated tasks over the internet. Although criminals can use them for malicious purposes, such ...
Android Application Hacking

Android Application Hacking

The most widely used alternative for consumers to desktop software has evolved to be Android apps. Sensitive data is processed often by mobile applications, and this makes them a prime target for ...
How Should API Keys be Stored?

How Should API Keys be Stored?

Mobile app developers keep hearing that they shouldn’t store API keys in their app code but they don’t hear where they should store them. In this article we discuss the topic and ...