Ostorlab Nuggets in June issue 5
Thu 27 May 2021

Health Tech, Compromises and attacks, Instrumentation, Black Hat conferences, eBPF and moreā€¦.

Dynamic Analysis
Universal bypass of SSL Pinning ... from theory to a full working PoC with LLDB
Tue 18 May 2021

This article is about bypassing SSL pinning without needing to. Sounds confusing? We will go over the theory, build a full PoC using LLDB in Python and finally extend it to other cool tasks.

Mobile Analysis
5 things every mobile security professional should know about WebViews
Tue 18 May 2021

This article is about WebViews and the security notions we need to have in mind when using these component in both Android and iOS.

Ostorlab detects Dependency Confusion
Wed 03 March 2021

Dependency Confusion is a new attack with high severity impact. This article is an overview of the vulnerability as well as other supply chain attacks.

Finding superhuman XSS polyglot payloads with Genetic Algorithms
Mon 01 March 2021

The following article is a technical deep dive into how genetic algorithms can be leveraged to create superhuman XSS polyglot payloads.

News and Updates of Week 8
Sun 28 February 2021

This weeks is marked by multiple high profile data breaches affecting Cashalo, Npower, Kia, T-Mobile and Clubhouse.

Ostorlab adds Web Security Scanning to its arsenal
Mon 15 February 2021

Ostorlab is adding Web Security Scanner to its arsenal with novel approaches to vulnerability discovery.

Release of a new analysis environment to aid manual assessment
Mon 11 January 2021

New Analysis Environment with access to disassembly, decompiled source, call trace, function tagging and many other features.

Finding and Validating Hardcoded Keys and Secrets
Fri 30 October 2020

Hardcoded secrets are easy to find and might open a gate to sensitive data or privileged access. This makes them a great target for Bug Bounty hunters and Attackers.

Autonomous Security
Autonomous Security: Pushing Security Automation to the Next Level
Mon 26 October 2020

The article introduces the term Autonomous Security in the context of security scanning and defines 5 tiers of maturity.