Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Category: Mobile security

Mobile Pentesting 101 – Bypassing Biometric Authentication

September 5, 2022 imorosan

Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.

Continue reading

Runtime Mobile Security (RMS) – How To Instrument Android Java Classes And Methods At Runtime

March 7, 2022 imorosan

Runtime Mobile Security (RMS) is a powerful web interface powered by Frida that helps you manipulate Android and iOS Applications at Runtime.

Continue reading

Root detection and SSL pinning bypass

February 1, 2022 imorosan

There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give you the top-most used methods for iOS and Android.

Continue reading

Mobile penetration testing on Android using Drozer

July 8, 2015 Daniel Tomescu

Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to

Continue reading

How to install Android 5.0.1 Lollipop on Samsung Galaxy S4

December 16, 2014 Ionut Popescu

 With the new release of Android 5.0.1 Lollipop, we wanted to explore its new features and security enhancements. However, since this version of Android is

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • Pentesting Azure: RECON Techniques
  • Mobile Pentesting 101 - Bypassing Biometric Authentication
  • Our DefCamp 2022 talks are here!
  • Practical Network Penetration Tester (PNPT): Real-life Penetration Testing exam - Tips & Tricks to pass the exam

Blog Stats

  • 285,708 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 106 other subscribers

Categories

  • Active Directory (1)
  • Announcements (1)
  • Cloud Security (4)
    • aws (4)
  • Conferences (4)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (10)
  • General security (10)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (16)
    • Code Review (1)
  • Mobile security (5)
  • Network security (3)
  • Operating systems (1)
  • Penetration Testing (13)
  • Pentest techniques (21)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 106 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...