Reading time:
~11 min
Posted
by Leon Jacobs
on
02 March 2021
I just got off a call with a client, and realised we need to think about how we report binary...
Reading time:
~21 min
Posted
by Dominic White
on
18 April 2019
tl;dr We reported a long standing PEAP bug in all Apple devices that would allow an attacker to force any...
Reading time:
~4 min
Posted
by Leon Jacobs
on
11 July 2017
introduction In this post, I want to introduce you to a toolkit that I have been working on, called objection....
Reading time:
~3 min
Posted
by chris
on
20 June 2016
Everyone has a mobile phone (ok some have two) and the wealth of information people put into them is staggering....
Reading time:
~8 min
Posted
by Dominic White
on
23 March 2016
With the recent buzz around the iMessage crypto bug from the John’s Hopkins team, several people pointed out that you...
Reading time:
~9 min
Posted
by etienne
on
18 March 2016
Mobile assessments are always fun as the environment is constantly evolving. A recent trend has been the use of custom...
Reading time:
~7 min
Posted
by saurabh
on
24 October 2011
This blog post steps through how to convert encrypted iPhone application bundles into plaintext application bundles that are easier to...