Thinking about Requests

The reason I want to wrap up this topic is just to keep all of my logics and comprehension of...

Android App – Local Attack

If you have read the “Thinking about request” article. This would be much more relevant. Previously, I had made a...

Crypto Wallet Local Storage Attack

‌PDF: https://www.exploit-db.com/docs/46466 Background During our mobile security pen testing, we have found a very interesting attack scenario in (Android application)....

Common vulnerabilities in mobile apps

Introduction During the time doing mobile pentest, I’ve realized that developers are often implementing an insecure code which makes an...