There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give you the top-most used methods for iOS and Android.
On a recent engagement, we found an instance of GraphQL on a server and I noticed that there are not many articles describing the different
During a black-box penetration test we encountered a Java web application which presented us with a login screen. Even though we managed to bypass the
There are a good number of situations when we find ourselves abusing the LLMNR and NBT-NS protocols on an infrastructure penetration test, more specifically on
In a recent penetration testing project we encountered a situation where in order to prove exploitability and possible damage we had to exfiltrate data from