In this post I will explain how SSL handshake works, what is certificate pinning and mutual authentication and how an attacker can bypass these controls.
In this article jailbreak detection method is analyzed and bypassed doing reversing.
Buffer overflow introduction with a real example.
A summary of basic commands and information gathering tools.
In this article it will be shown how it works Microsoft Windows’s name resolution services and how can it be abused.