Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: Mobile pentesting series part 2: reversing Android application

Mobile pentesting series part 2: reversing Android application

You may be curious, as a penetration tester, as to how a particular app feature operates or what library it utilizes. Otherwise, you may be interested in the underlying architectures or components of

cover image for article: Mobile Pentesting Series - part 1: bypass SSL pinning in Android

Mobile Pentesting Series - part 1: bypass SSL pinning in Android

The purpose of this article is to demonstrate how to circumvent SSL pinning on Android.

cover image for article: STUN Protocol IP Exposure Tool by WebSec

STUN Protocol IP Exposure Tool by WebSec

The STUN Interception Tool is a powerful tool designed to leverage the principles of STUN. Learn more about its features and how to use it effectively.

cover image for article: YARA rules Part 2: Using modules

YARA rules Part 2: Using modules

Let's continue our acquaintance with YARA rules

cover image for article: YARA Part 1: Malware analysis for detecting IOC's

YARA Part 1: Malware analysis for detecting IOC's

Yara is an instrument used to assist malware researchers in the identification and classification of malware samples.

cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

Load More