Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: frida

Mobile Pentesting 101 – Introducing to MMSF (Massive Mobile Security Framework)

September 18, 2023 Ionut Morosan

Massive Mobile Security Framework, or MMSF, is a mobile framework that combines functionalities from Frida, objection, drozer, and many more.

Continue reading

Mobile Pentesting 101 – How to Set Up Your iOS Environment

June 12, 2023 Ionut Morosan

As mentioned in the Mobile Pentesting 101 – How to set up your Android Environment article, I am now offering you valuable information regarding the

Continue reading

Mobile Pentesting 101 – How to set up your Android Environment

April 3, 2023 Ionut Morosan

This article gives an idea about how your Android pentesting environment should look like. What tools should I use? Do I really need a physical device? Do I need a rooted device to pentest an application?

Continue reading

Mobile Pentesting 101 – Bypassing Biometric Authentication

September 5, 2022 Ionut Morosan

Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.

Continue reading

Runtime Mobile Security (RMS) – How To Instrument Android Java Classes And Methods At Runtime

March 7, 2022 Ionut Morosan

Runtime Mobile Security (RMS) is a powerful web interface powered by Frida that helps you manipulate Android and iOS Applications at Runtime.

Continue reading

Root detection and SSL pinning bypass

February 1, 2022 Ionut Morosan

There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give you the top-most used methods for iOS and Android.

Continue reading

Top Posts

  • Mobile Pentesting 101: How to Install Split APKs
  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • Introduction to Windows shellcode development - Part 1
  • A Complete Kubernetes Config Review Methodology

Blog Stats

  • 553,152 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar