Insights
- All insights
- Application
- Mobile
- Network
- Uncategorized
Mobile
- [2min]
Defeating Android Emulator Detection
At some point while performing vulnerability assessments on android applications you will encounter apps that don’t want to be run within an emulator. We can’t blame application owners for wanting to ensure that the user interaction they see comes from genuine devices, but it doesn’t help us do any security testing on it. There are […]
- [1min]
Win a Ticket to AppSecusa!
Want to go to AppSec USA for FREE? We are giving away a FULL conference pass to AppSec USA this week in New York City.
- [4min]
Top 5 Android Pentesting Tools
1 – You. You are the first and most important step in an Android vulnerability assessment. Mobile vulnerability assessments require a keen eye to evaluate application functionality and design. This means identifying controls which are performed on the client itself. Once you have performed a full review of an application and determined exactly what controls […]
- [4min]
Locating Rogue WiFi Access Points
During a wireless ethical hacking assessment, one objective should always be to identify rogue wireless access points. This ensures that an attacker outside the building cannot use a wireless “backdoor” to access the internal network. Whether a malicious employee has planted an access point (AP), or a well-meaning employee has insecurely configured an AP for […]
- [3min]
iOS Background Screen Caching
When the home key on an iPhone or iPad is pressed, a screenshot is immediately taken of the current application. This is done to generate an animation of the application which appears to “shrink” into the screen. The image is also stored for use as a thumbnail image for the running application. If sensitive information […]