Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Tag: frida

Mobile Pentesting 101 – How to set up your Android Environment

April 3, 2023 imorosan

This article gives an idea about how your Android pentesting environment should look like. What tools should I use? Do I really need a physical device? Do I need a rooted device to pentest an application?

Continue reading

Mobile Pentesting 101 – Bypassing Biometric Authentication

September 5, 2022 imorosan

Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.

Continue reading

Runtime Mobile Security (RMS) – How To Instrument Android Java Classes And Methods At Runtime

March 7, 2022 imorosan

Runtime Mobile Security (RMS) is a powerful web interface powered by Frida that helps you manipulate Android and iOS Applications at Runtime.

Continue reading

Root detection and SSL pinning bypass

February 1, 2022 imorosan

There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give you the top-most used methods for iOS and Android.

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • Mobile Pentesting 101 - Bypassing Biometric Authentication
  • Introduction to AI Prompt Injections (Jailbreak CTFs)
  • Mobile Pentesting 101 - How to set up your Android Environment
  • Practical JSONP Injection

Blog Stats

  • 314,037 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 119 other subscribers

Categories

  • Active Directory (2)
  • Announcements (2)
  • Cloud Security (8)
    • aws (6)
    • Azure (1)
  • Conferences (4)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (11)
  • General security (11)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (15)
    • Artificial Intelligence (1)
    • Code Review (1)
  • Mobile security (6)
  • Network security (4)
  • Operating systems (1)
  • Penetration Testing (17)
  • Pentest techniques (24)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 119 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar