Build an IOS pentesting lab via XCode Simulator

This blog is written by our student Pranav Sharma. Doing an iPhone pen-testing can be a tedious task in itself and not having an actual…
Read More

Kerberoasting Simplified

Introduction As Kerberos is an authentication protocol it is possible to perform brute-force attacks against it (providing we are careful). Kerberos brute-force has a lot…
Read More

Kerberoasting initial: AS-REP Roasting

Introduction AS-REP roasting is an attack that is often-overlooked in my opinion it is not extremely common as you have to explicitly set Accounts Does not Require…
Read More

Herpaderping process– Evading Windows Defender Security

Evading windows defender security is always an interesting topic for information security professionals. When designing products for securing Windows platforms, many engineers in this field…
Read More

Powershell Restrictions bypasses

In most mature environments and in most of these tests, access to command line tools is restricted. Employees typically cannot spawn Command Prompt or PowerShell.…
Read More

Decrypting IOS apps Essentials

Frida way:- Step 1: Install Frida on the system (Mac/Windows) and iPhone I’m using my Linux pentesting box and installed Frida using #pip install Frida-tools Step 2: install…
Read More