Active Directory Pentesting Notes and Checklist AD Basics Domains Domains are used to group and manage objects in an organization An administrative boundary for applying polici...
iOS Pentesting
IOS Penetration Testing Contents 1. Setup 2. Cydia Configurations 3. SSH into Device 4. Extracting the IPA File 5. Decompile the IPA file 6. Check for Hardcoded and URL endpoints 7. Digging into...
Android Pentesting Checklist
Android Penetration Testing Contents 1. Setup and Decompile 2. Verify Signing 3. Check for Hardcoded and URL endpoints 4. Digging into AndroidManifest.xml File 5. Network 6. Storage 7. Analyze t...
Solving Cybergym CTF Lab1
Solving Cybergym CTF Lab1. This writeup describes the process carried out to solve the Cybergym Android CTF Lab1 with some mitigation techniques. The aim of this CTF is to retrieve the passcode ne...