White Papers
-
Microsoft Company Portal – iOS Pin Code bypass for Persistence
On a recent engagement I was tasked to conduct a penetration test against an Intune enrolled iPhone with…
-
Car Hacking: Common Vulnerabilities and Exploits
Introduction: As of September 2023, there are 33.6 million cars on the road in the UK [1], and…
-
Drone Vulnerabilities: An Offensive Introduction to the History and Modern use of UAVs and the Attack Surfaces they Present.
Introduction Since the early 1900’s, radio guided drones or Unmanned Aerial Vehicles (UAVs) have been an important part…
-
PSNI Data Breach
Introduction This whitepaper will explore the PSNI Data Breach which demonstrates the legal protocols involved in protecting and…
-
An Introduction To Scada System Security
What is a SCADA System? A Supervisory Control And Data Acquisition system is a combination of software and…
-
Root Detection Bypass Appendix
Appendix Instructions The frida-server executable to be run on the mobile device can be found from the following…
-
Exploring Common Vulnerabilities in Self-Driving Cars
Introduction Automated vehicles (AVs) appear to be the future, with more and more automatic features being added to…
-
Introduction to Kiosk Breakout
Introduction A ‘kiosk’ refers to a self-contained computer terminal or device that allows users to access specific applications…
-
Decentralised Applications and Blockchain Security
Introduction With the advent of Web3 and blockchain technology, decentralised applications (DApp) have risen in popularity. Instead of…