allysonomalley.com

  • About

Runtime Manipulation

Reverse Engineering

The Top 5 Most Common Mobile App Security Flaws

Whether you’re a pentester looking to gain some experience in mobile hacking or a developer aiming to build secure apps, familiarizing yourself with some of the common security mistakes developers make will serve you well. I’ve listed and summarized here the five most common types of mobile app security flaws Read more…

By Allyson O'Malley, 5 years5 years ago
Dynamic Analysis

Bypassing an App’s PIN Protection with cycript

**NOTE: The app being analyzed is not my own, and therefore I have left out any identifying information. This is just a walkthrough of the steps one can take to search for similar vulnerabilities. This walkthrough will show how to use cycript to extract information from the app at runtime, Read more…

By Allyson O'Malley, 7 years7 years ago
  • Home
  • About
Hestia | Developed by ThemeIsle