Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: security testing

Mobile Pentesting 101: How to Pull APKs from Work Profile – A Real-World Intune Challenge

July 16, 2025 Ionut Morosan

Introduction During a recent mobile application penetration test, I encountered a challenging scenario that many mobile security testers face nowadays: extracting APKs from applications installed

Continue reading

Mobile Pentesting 101 – Bypassing Biometric Authentication

September 5, 2022 Ionut Morosan

Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.

Continue reading

Security Source Code Review – Manual Approaches

June 6, 2022 Eduard Agavriloae

Performing security source code reviews is part of the penetration tester’s life. Either that this is the whole scope of an engagement or you exfiltrated

Continue reading

Exploiting Timed Based RCE

February 28, 2017 Pobereznicenco Dan

In a recent penetration testing project we encountered a situation where in order to prove exploitability and possible damage we had to exfiltrate data from

Continue reading

5 Benefits of a penetration test

January 5, 2015 Adrian Furtuna

Penetration testing projects are definitely fun for the passionate pentesters. However, the question is what are the real benefits of a pentest for the client

Continue reading

Top Posts

  • Mobile Pentesting 101: How to Install Split APKs
  • Introduction to Windows shellcode development – Part 3
  • Mobile Pentesting 101 - Introducing to MMSF (Massive Mobile Security Framework)
  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Introduction to Windows shellcode development - Part 1

Blog Stats

  • 541,980 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...