· Nilesh Kapoor
In this blog post Nilesh shares his experience performing a SCADA assessment, what pentest approach works best for highly sensitive systems, and preferred tools of the trade.
· Chris Berry
An overview of how to begin searching for vulnerabilities within software, by fuzzing the binary with AFL
· Tim Goddard
Unfortunately, many SAML consumers don’t validate responses properly, allowing attacks up to and including full authentication bypass.
· Claudio Contin
The following post aims to provide a high level overview of an iOS application security review methodology and an introduction of some tools publicly available to perform the analysis.