877.791.9571 |

About the Author:

Satish B (@satishb3) is an Information Security Professional with 6 years of experience in penetration testing of web applications and mobile applications. He is currently a security researcher at Infosec Institute. Satish's blog is located at - http://www.securitylearn.net Email: satishb3@securitylearn.net
PentestingiPhoneApp08302013

Penetration Testing for iPhone Applications — Part 6

In Part 1 of the article we have discussed about the iPhone application traffic analysis. Part 2, Part 3, and Part 4 covered in-depth analysis of insecure data storage […]

iPhone-app-06252013

Penetration Testing for iPhone Applications – Part 5

In the first part of the article, we discussed traffic analysis for iPhone applications. The second, third and fourth parts of the article covered an in-depth analysis of insecure […]

Penetration Testing for iPhone Applications – Part 4

In the first part of the article, we have discussed the iPhone application traffic analysis. The second part of the article covered privacy issues and property list data storage. […]

irecovery-stick-03122012

Paraben’s iRecovery Stick Review

Paraben’s iRecovery Stick is a USB flash drive designed to recover deleted data from Apple iOS devices like the iPhone, iPad and iPod touch. The product allows investigators to […]

Security concept: Lock on digital screen, contrast, 3d render

Penetration Testing for iPhone Applications – Part 3

In the first part of this article, we have discussed the iPhone application traffic analysis. The second part of the article covered the privacy issues and property list data […]

iphonef4

iPhone Forensics—Analysis of iOS 5 backups: Video

In the first part of this article, we covered techniques for reading iTunes backups. In the second part of this article, we disclosed the procedure to extract protection class […]

iphonef4

iPhone Forensics – Analysis of iOS 5 backups : Part 2

In the first part of this article, we discussed the techniques to read iTunes backups. The following article discloses the procedure to extract protection class keys from the Backup […]

iphonef4

iPhone Forensics – Analysis of iOS 5 backups : Part 1

iPhone forensics can be performed on the backups made by iTunes or directly on the live device. This Previous article on iPhone forensics detailed the forensic techniques and the […]

iPhoneapps

Penetration Testing for iPhone Applications- Part 2

In the first part of this article, we discussed the iPhone application traffic analysis. In this part, we will take a look at the privacy issues and the […]

iPhoneapps

iPhone Hacking! Penetration Testing for iPhone Applications – Part 1

This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iPhone applications. It attempts to cover the entire application penetration […]

iphoneforensics

iPhone Forensics

iPhone forensics can be performed on the backups made by iTunes (escrow key attack) or directly on the live device. This article explains the technical procedure and the challenges […]