Blogs
About
_
Trainings
_
I am Prateek Gianchandani. I have interests in Reverse Engineering, Mobile and Browser Security, and i am the founder of 8ksec. I hope you enjoy the content in this Blog.
articles tagged with
security
ARM64 Reversing and Exploitation Part 3 - A Simple ROP Chain
security
ios
Sep 6, 2020
ARM64 Reversing and Exploitation Part 2 - Use After Free
security
ios
Sep 6, 2020
ARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow
security
ios
Sep 5, 2020
From zero to tfp0 - Part 2: A Walkthrough of the voucher_swap exploit
security
ios
Jun 1, 2020
From zero to tfp0 - Part 1: Prologue
security
ios
Jun 1, 2020
iOS Application Security Part 55 - Inspecting iOS apps with Passionfruit
security
Jul 31, 2018
iOS Application Security Part 54 - The Needle Framework
security
Jul 30, 2018
iOS Application Security Part 53 - Objection continued
security
Jul 29, 2018
iOS Application Security Part 52 - Inspecting iOS apps with Objection
security
Jul 28, 2018
iOS Application Security Part 51 - Dumping decrypted IPA and Dynamic Instrumentation on a non-jailbroken device
security
Jul 27, 2018
iOS Application Security Part 50 - Touch ID Bypass with Frida
security
Jul 26, 2018
iOS Application Security Part 49 - Runtime Patching with Frida
security
Jul 24, 2018
iOS Application Security Part 48 - Frida APIs
security
Jul 24, 2018
iOS Application Security Part 47 - Inspecting Apps with Frida
security
Jul 23, 2018
Releasing Damn Vulnerable iOS App v2.0 - written in Swift
security
Apr 19, 2018
iOS Application Security Part 46 - App Transport Security
security
Jun 23, 2016
iOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS app version 1.5
security
May 31, 2015
iOS Application Security Part 44 - Bypassing Jailbreak detection using Xcon
security
May 23, 2015
iOS Application Security Part 43 - FAT binaries & LLDB usage continued
security
May 17, 2015
iOS Application Security Part 42 - LLDB Usage continued
security
May 12, 2015
iOS Application Security Part 41 - Debugging applications using LLDB
security
Apr 28, 2015
iOS Application Security Part 40 - Testing apps on your Mac
security
Apr 28, 2015
Damn Vulnerable iOS App solutions free for download
security
Apr 3, 2015
Android Application hacking with Insecure Bank Part 4
security
Mar 29, 2015
Android Application hacking with Insecure Bank Part 3
security
Mar 28, 2015
iOS Application Security Part 39 – Sensitive information in memory
security
Mar 24, 2015
Android Application hacking with Insecure Bank Part 2
security
Mar 23, 2015
iOS Application Security Part 38 - Attacking apps using Parse (Guest Lecture by Egor Tolstoy)
security
Jan 24, 2015
iOS Application Security Part 37 - Adapting to iOS 8
security
Dec 20, 2014
Damn Vulnerable iOS App v1.4 launched
security
Dec 1, 2014
Android Application hacking with Insecure Bank Part 1
security
android
Nov 24, 2014
iOS Application Security Part 36 – Bypassing certificate pinning using SSL Kill switch
security
Nov 3, 2014
Wifite Walkthrough part 2: Cracking WPA access points
security
Oct 27, 2014
Wifite Walkthrough part 1: Cracking WEP access points
security
Oct 27, 2014
iOS Application Security Part 35 – Auditing iOS Applications With iDB
security
Oct 18, 2014
iOS Application Security Part 34 - Tracing Method calls using Logify
security
Apr 18, 2014
iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate)
security
Apr 18, 2014
iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
security
Mar 25, 2014
iOS Application Security Part 31 - The problem with using third party libraries for securing your apps
security
Mar 18, 2014
How to distribute IPA file for jailbroken devices
ios
security
Mar 12, 2014
iOS Application Security Part 30 - Attacking URL schemes
security
Mar 7, 2014
GDB segmentation fault issue fix with jailbroken device
security
Mar 6, 2014
iOS Application Security Part 29 - Insecure or Broken Cryptography
security
Jan 17, 2014
iOS Application Security Part 28 - Patching iOS Application with Hopper
security
Jan 17, 2014
iOS Application Security Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak
security
Jan 17, 2014
iOS Application Security Part 26 – Patching iOS Applications using IDA Pro and Hex Fiend
security
Dec 17, 2013
iOS Application Security Part 25 – Secure Coding Practices for iOS Development
security
Dec 17, 2013
iOS Application Security Part 24 – Jailbreak Detection and Evasion
security
Dec 17, 2013
iOS Application Security Part 23 – Defending against runtime analysis and manipulation
security
Dec 17, 2013
iOS Application Security Part 22 – Runtime Analysis and Manipulation using GDB
security
Dec 17, 2013
iOS Application Security Part 21 – ARM and GDB Basics
security
Nov 8, 2013
iOS Application Security Part 20 – Local Data Storage (NSUserDefaults
security
Oct 26, 2013
iOS Application Security Part 19 – Programmatical Usage of Introspy
security
Oct 26, 2013
iOS Application Security Part 18 – Detecting custom signatures with Introspy
security
Sep 26, 2013
iOS Application Security Part 17 – Black-Box Assessment of iOS Applications using INTROSPY
security
Sep 23, 2013
iOS Application Security Part 16 – Runtime Analysis of iOS Applications using iNalyzer
security
Sep 17, 2013
iOS Application Security Part 15 – Static Analysis of iOS Applications using iNalyzer
security
Sep 17, 2013
iOS Application Security Part 14 – Gathering information using Sogeti Data Protection tools
security
Sep 17, 2013
iOS Application Security Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools
security
Sep 17, 2013
iOS Application Security Part 12 – Dumping Keychain Data
security
Aug 20, 2013
iOS Application Security Part 11 – Analyzing Network Traffic over HTTP/HTTPS
security
Aug 20, 2013
iOS Application Security Part 10 – iOS Filesystem and Forensics
security
Aug 20, 2013
iOS Application Security Part 9 – Analyzing Security of iOS Applications using Snoop-it
security
Aug 20, 2013
iOS Application Security Part 8 - Method Swizzling using Cycript
security
Jul 25, 2013
iOS Application Security Part 7 - Installing and Running Custom Applications on Device without a registered developer account
security
Jul 25, 2013
iOS Application Security Part 6 - New Security Features in iOS 7
security
Jul 25, 2013
iOS Application security Part 5 – Advanced Runtime analysis and manipulation using Cycript (Yahoo Weather App)
ios
security
Jul 2, 2013
iOS Appllication Security Part 4 – Runtime Analysis Using Cycript (Yahoo Weather App)
security
Jul 2, 2013
Burpsuite Walkthrough
security
burpsuite
Jun 19, 2013
iOS Application security Part 3 - Understanding the Objective-C Runtime
security
Jun 16, 2013
iOS Application security Part 2 - Getting class information of iOS apps
security
Jun 16, 2013
iOS Application security Part 1 - Setting up a mobile pentesting platform
security
Jun 16, 2013
Ghost USB Honeypot Part 2 - Installing and running the honeypot
security
honeypots
Jun 15, 2013
Ghost USB Honeypot Part 1- Interview with Project Leader Sebastian Poeplau
security
honeypots
Jun 15, 2013
Backtrack 5 R3 Walkthrough part 4
security
backtrack
Jun 15, 2013
Backtrack 5 R3 Walkthrough part 3
security
backtrack
Jun 15, 2013
Backtrack 5 R3 Walkthrough part 2
security
backtrack
Jun 15, 2013
Backtrack 5 R3 Walkthrough part 1
security
backtrack
Jun 15, 2013
Defcon 20 Day 3 Review
defcon
security
Jun 15, 2013
Defcon 20 Day 2 Review
security
defcon
Jun 15, 2013
Defcon 20 Day 1 Review
defcon
security
Jun 15, 2013
A New DNS Exploitation technique - Ghost domain names
dns
security
Jun 15, 2013
Circumventing NAT using UDP hole punching
networking
security
Jun 13, 2013
Scanning the web with Ammonite
web-application-security
security
Jun 13, 2013
Inserting Vulnerabilities in Web Applications
web-application-security
security
Jun 13, 2013
w3af walkthrough and tutorial part 4 - w3af tools
w3af
web-application-security
security
Jun 13, 2013
w3af walkthrough and tutorial part 3 - Remaining plugins
w3af
web-application-security
security
Jun 13, 2013
w3af walkthrough and tutorial part 2 - Discovery and Audit plugins
w3af
web-application-security
security
Jun 13, 2013
W3af walkthrough Part 1
w3af
web-application-security
security
Jun 13, 2013
Defending the Internet with Project Meshnet
meshnet
privacy
security
Jun 13, 2013
Timing Analysis Attacks in Anonymous Systems
security
timing-analysis-attacks
Jun 12, 2013
Hacking Web Authentication – Part 2
security
authentication
burpsuite
Jun 12, 2013
Hacking Web Authentication – Part 1
security
authentication
burpsuite
Jun 12, 2013
KARMETASPLOIT
security
metasploit
Jun 12, 2013
Abusing IP Protocols to Create Covert Channels when Penetration Testing
security
maintaining-access
Jun 12, 2013
DNS Hacking - Beginner to Advanced
security
Jun 9, 2013
all tags
android
authentication
backtrack
burpsuite
defcon
dns
honeypots
ios
maintaining-access
meshnet
metasploit
networking
privacy
security
timing-analysis-attacks
w3af
web-application-security