Android SELinux Internals Part I | 8kSec Blogs


This is part I of a 2 part series on Android SELinux Internals where we will do a deepdive into the world of SELinux on Android and understand its inner workings, along with its functionalities and benefits. We’ll discuss how SELinux provides security on Android devices and ways to bypass it. This is going to […]

iOS Deep Link attacks Part 2 – Exploitation | 8kSec Blogs


In Part 2 of this series on iOS Deep Link attacks, we will explore how to identify different vulnerabilities on iOS Deep Link and the technical demonstration to exploit them. If you haven’t yet checked out Part 1, you can view it here. Agenda In this blog we will cover the deep link vulnerabilities as […]

Advanced Frida Usage Part 2 – Analyzing Signal and Telegram messages on iOS | 8kSec Blogs

frida signal

Introduction In this blog post, we will explore the message objects in two popular chat applications: Signal and Telegram. We’ll take similar technical approaches to analyze them, and also learn how to inspect Swift strings, which differ from typical object types. Get ready for a straightforward yet insightful exploration into the world of chat application […]

iOS Deep Link Attacks Part 1 – Introduction | 8kSec Blogs


Introduction In Part 1 of this series on iOS Deep link attacks, we will explore how to recognize various types of deep link schemas used in iOS apps and identify potential vulnerabilities associated with them. The focus of this part will be to describe the different types of schemas and explain methods for identifying them. […]

Advanced Frida Usage Part 1 – iOS Encryption Libraries | 8kSec Blogs


Introduction Welcome to Part 1 of Advanced Frida Series. In this series, we will look at how we can unleash the power of Frida to do some advanced analysis of apps and daemons. The first part will dive into an analysis of a third party iOS library used for data encryption. iOS applications sometimes want […]