Category:mobile application security
Android Pentesting Lab Setup – 101
HEY FOLKS!!! Let’s Talk About Android PenTesting Lab Setup!!! Mobile or Android penetration testing is a security assessment process that looks for vulnerabilities in mobile…
Analyzing the Ipa like a pro
This blog explains the procedure to analyze and identify potential security vulnerabilities in the files present in the IPA file of an iOS application. In…
Decrypting IOS apps Essentials
Frida way:- Step 1: Install Frida on the system (Mac/Windows) and iPhone I’m using my Linux pentesting box and installed Frida using #pip install Frida-tools Step 2: install…
Creating Rooted AVD in Android Studio
For a security enthusiast, a rooted Android device is essential to perform dynamic assessments of Android applications. They either rely on a physical device or…
Analyze the Local Data Storage Of IPA from iOS device
.IPA is the package file for an iOS application. The difference is that an .IPA file can only be installed on a non-jailbroken iPhone via…
Local Storage Analysis of IPA from pentesting device
This Blog explains the methods to analyze and investigate the potential security loopholes in an iOS application. In order to get an understanding of the…
Android SSL pinning bypass with Frida
WHAT IS CERTIFICATE PINNING? Certificate pinning is the process of associating a host with their expected X.509 certificate or public key. Once a certificate or…
Build the IPA From Device and IPA Container Analysis
First Lets build the IPA from the Phone : – the IPA container consists of all the files that come along with the application when…
iOS IPA Architecture for Pentesters
iOS application security is the most trending topic nowadays on social media. Although Apple claims that they are building the best products in the market…
