Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: cyber-security

Mobile Pentesting 101: How to Pull APKs from Work Profile – A Real-World Intune Challenge

July 16, 2025 Ionut Morosan

Introduction During a recent mobile application penetration test, I encountered a challenging scenario that many mobile security testers face nowadays: extracting APKs from applications installed

Continue reading

Chained Vulnerabilities in Web Applications

October 25, 2024 Adrian Tuchel

Introduction Vulnerability chaining, also known as exploit chaining, is the process of combining multiple vulnerabilities to achieve a more significant or impactful attack by exploiting

Continue reading

Top Posts

  • Understanding PHP Object Injection
  • Practical JSONP Injection
  • How to intercept traffic from Java applications
  • Intercepting functions from statically linked libraries
  • Exploiting Timed Based RCE

Blog Stats

  • 605,135 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 157 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar