IOS Penetration Testing Links
Setting up a Jailbreak Environment For Beginners
https://medium.com/@lucideus/setting-up-a-jailbreak-environment-for-beginners-e3225944b400
Understanding the Structure of an iOS Application
https://medium.com/@lucideus/understanding-the-structure-of-an-ios-application-a3144f1140d4
Understanding the ios file system
https://medium.com/@lucideus/understanding-the-ios-file-system-eee3dc87e455
Preparing iPhone for Application Security
https://medium.com/@lucideus/preparing-iphone-for-application-security-6b32962bee94
Analyzing the IPA file of an iOS based application
https://medium.com/cybersecurityservices/analyzing-the-ipa-file-of-an-ios-based-application-9c0a1749fe69
Analyzing the Local Data of an iOS based application
https://medium.com/cybersecurityservices/analyzing-the-local-data-of-an-ios-based-application-da5f706b5fb0
Getting Started with Traffic Analysis of iOS Applications — Part 1 (Application Traffic and Burp Suite Tabs)
https://medium.com/cybersecurityservices/getting-started-with-traffic-analysis-of-ios-applications-part-1-application-traffic-and-burp-84313e1334ff
Requests and Responses of an iOS Application
https://medium.com/lucideus/requests-and-responses-of-an-ios-application-4f6cc85f3ddc
Setting up a Jailbreak Environment For Beginners
https://medium.com/@lucideus/setting-up-a-jailbreak-environment-for-beginners-e3225944b400
Understanding the Structure of an iOS Application
https://medium.com/@lucideus/understanding-the-structure-of-an-ios-application-a3144f1140d4
Understanding the ios file system
https://medium.com/@lucideus/understanding-the-ios-file-system-eee3dc87e455
Preparing iPhone for Application Security
https://medium.com/@lucideus/preparing-iphone-for-application-security-6b32962bee94
Analyzing the IPA file of an iOS based application
https://medium.com/cybersecurityservices/analyzing-the-ipa-file-of-an-ios-based-application-9c0a1749fe69
Analyzing the Local Data of an iOS based application
https://medium.com/cybersecurityservices/analyzing-the-local-data-of-an-ios-based-application-da5f706b5fb0
Getting Started with Traffic Analysis of iOS Applications — Part 1 (Application Traffic and Burp Suite Tabs)
https://medium.com/cybersecurityservices/getting-started-with-traffic-analysis-of-ios-applications-part-1-application-traffic-and-burp-84313e1334ff
Requests and Responses of an iOS Application
https://medium.com/lucideus/requests-and-responses-of-an-ios-application-4f6cc85f3ddc
Medium
Setting up a Jailbreak Environment For Beginners
Introduction
External XML Entity via File Upload (SVG)
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
Setup your Terminal and CMD for AWS testing
https://medium.com/sourav-sahana/setup-your-terminal-for-aws-testing-b65f8d5fc36a
https://medium.com/sourav-sahana/setup-your-terminal-for-aws-testing-b65f8d5fc36a
Medium
Setup your Terminal and CMD for AWS testing
Hi Hunters!! Hope you all are good and hunting well. In this write up you will see how I configured my terminal for AWS testing. If you…
“A Simple IDOR to Account Takeover” by Swapmaurya https://link.medium.com/v5uhRZEy53
Medium
A Simple IDOR to Account Takeover
Getting Started with IDOR, What is IDOR?
“Serious back door Vulnerabilities spotted in Tik Tok” by Faisal Khan https://link.medium.com/HwdfDmBPZ3
Medium
Serious back door Vulnerabilities spotted in TikTok
The security flaws were identified by a cybersecurity firm Check Point, which the company claims to have fixed
Blind IDOR in LinkedIn iOS application
https://hailstorm1422.com/linkedin-blind-idor/
https://hailstorm1422.com/linkedin-blind-idor/
CVE-2020-5842 Stored XSS Vulnerability in Codoforum 4.8.3
https://medium.com/@prasanthc41m/cve-2020-5842-stored-xss-vulnerability-in-codoforum-4-8-3-b2e1133c6a91
https://medium.com/@prasanthc41m/cve-2020-5842-stored-xss-vulnerability-in-codoforum-4-8-3-b2e1133c6a91
Medium
CVE-2020-5842 Stored XSS Vulnerability in Codoforum 4.8.3
Happy New Year 2020!!!
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
Medium
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
Introduction
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care https://medium.com/@ozguralp/unauthorized-google-maps-api-key-usage-cases-and-why-you-need-to-care-1ccb28bf21e
Medium
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care
For the ones who do not have any information about this service and its API Key’s, Google Maps API is a paid service which allows…