Lifehacks for hackers: how to audit mobile apps
In web app security, a large number of clients attack the server. In client app security, the situation is opposite – […]
Read More →In web app security, a large number of clients attack the server. In client app security, the situation is opposite – […]
Read More →Well, we pwned one more piece of software. Who cares? Nah, nobody. Alright, now user “nobody” – see how we did […]
Read More →The stablest and the most efficient way to find the brand new and very own 0-days with no lingering deployment is […]
Read More →Mobile applications should not trust other applications on the device. The new generation likes it when an organization wants them to […]
Read More →Offensive Security passionaries believe that hackers should always “Try Harder!”. Generally, I respect this position. But what hackers usually forget is […]
Read More →In the previous post we described a couple of inoERP bugs and made a conclusion that inoERP software is too buggy […]
Read More →Researchers transfer files to compromised hosts with a couple of techniques as the host configuration may vary. I can briefly remember […]
Read More →We chose to improve security of the InoERP application by the next reasons: Alive forum. However, as the vendor pretended to […]
Read More →