Mobile App Penetration Test Blog by turingpoint

Blog posts about Mobile App Penetration Test from our team.

FORCEDENTRY: iMessage zero-click Exploit in Check
FORCEDENTRY: iMessage zero-click Exploit in Check
New

An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.

More
What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Pinning of Certificates and Public Keys
Pinning of Certificates and Public Keys

Public key pinning allows you to specify your public key set for a future SSL/TLS connection to your host.

More
Pentest: Which Components should be Considered First?
Pentest: Which Components should be Considered First?

For most applications, it makes sense to check the API interface first. Vulnerabilities of severity critical can arise here.

More
Does a Pentest have to be Done only Once?
Does a Pentest have to be Done only Once?

Companies often think that a single pentest before rolling out a system is sufficient. Why this assumption is a mistake?

More
What is an Ethical Hacker?
What is an Ethical Hacker?

Hackers have a bad reputation. They penetrate security systems, steal data and cause financial damage. But is that true?

More
Six Linux Distributions for Penetration Testing
Six Linux Distributions for Penetration Testing

For penetration tests, there are various Linux distributions that are precisely tailored for use in security analyses.

More