Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: mobile

Mobile Pentesting 101 – The Death of ADB Backup: Modern Data Extraction in 2026

February 2, 2026 Ionut Morosan

For a long time, the adb backup command was the “Swiss Army Knife” for mobile pentesters. It allowed us to pull the private /data/data/ folder

Continue reading

Mobile Pentesting 101: How to Pull APKs from Work Profile – A Real-World Intune Challenge

July 16, 2025 Ionut Morosan

Introduction During a recent mobile application penetration test, I encountered a challenging scenario that many mobile security testers face nowadays: extracting APKs from applications installed

Continue reading

Mobile Pentesting 101 – How to set up your Android Environment

April 3, 2023 Ionut Morosan

This article gives an idea about how your Android pentesting environment should look like. What tools should I use? Do I really need a physical device? Do I need a rooted device to pentest an application?

Continue reading

Mobile Pentesting 101 – Bypassing Biometric Authentication

September 5, 2022 Ionut Morosan

Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.

Continue reading

Top Posts

  • Introduction to Windows shellcode development - Part 1
  • Introduction to Windows shellcode development – Part 2
  • Introduction to Windows shellcode development – Part 3
  • Practical JSONP Injection
  • Mobile Pentesting 101 - Bypassing Biometric Authentication

Blog Stats

  • 657,168 hits

Follow us via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (14)
  • IT Security Assurance (1)
  • IT Security Audit (3)
  • Metasploit (1)
  • Misc (21)
    • Artificial Intelligence (2)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (30)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Powered by WordPress.com.
 

Loading Comments...