Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Category: Mobile security

Runtime Mobile Security (RMS) – How To Instrument Android Java Classes And Methods At Runtime

March 7, 2022 imorosan

Runtime Mobile Security (RMS) is a powerful web interface powered by Frida that helps you manipulate Android and iOS Applications at Runtime.

Continue reading

Root detection and SSL pinning bypass

February 1, 2022 imorosan

There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give you the top-most used methods for iOS and Android.

Continue reading

Mobile penetration testing on Android using Drozer

July 8, 2015 Daniel Tomescu

Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to

Continue reading

How to install Android 5.0.1 Lollipop on Samsung Galaxy S4

December 16, 2014 Ionut Popescu

 With the new release of Android 5.0.1 Lollipop, we wanted to explore its new features and security enhancements. However, since this version of Android is

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • Practical JSONP Injection
  • IoT Pentesting 101: How to Hack MQTT - The Standard for IoT Messaging
  • Introduction to Windows shellcode development - Part 1
  • How to get your first CVE

Blog Stats

  • 256,581 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 96 other followers

Categories

  • Active Directory (1)
  • Announcements (1)
  • Conferences (3)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (8)
  • General security (9)
  • IT Security Assurance (1)
  • IT Security Audit (1)
  • Metasploit (1)
  • Misc (15)
    • Code Review (1)
  • Mobile security (4)
  • Network security (3)
  • Operating systems (1)
  • Penetration Testing (11)
  • Pentest techniques (19)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 96 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...