In this article it will be shown how it works Microsoft Windows’s name resolution services and how can it be abused.
Introduction to iOS system security, encryption and data protection, app security and Objective C.
A summary of all the commands and staff I analyze during an iOS application pentest.
This is a quick guide of the tools used to do iOS pentesting.
With chntpw is possible to see and edit the information stored in SAM file, allowing an attacker to reset the password of a user or elevate its privileges.
Obtain a shell with SYSTEM privilege in the log in screen using the functionality ‘Sticky Keys’. This technique can be used if the attacker has physical access to the target machine.