Brute Forcing PINs with Frida: Mobile Penetration Testing
Sep 07, 2023

Brute Forcing PINs with Frida: Mobile Penetration Testing

Walk through mobile penetration testing on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
Aug 28, 2023

Taking Off with Golang: An Introduction to the Corellium API Bindings for Go

We simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
Aug 23, 2023

Building What's Next: The Future of R&D for Mobile, IoT, and Beyond

The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
Aug 22, 2023

Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development

IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.
Finding Hooks in Android Applications: Tools for Security Research
Aug 11, 2023

Finding Hooks in Android Applications: Tools for Security Research

Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Aug 02, 2023

Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial

Forward-looking security researchers are using virtualization for iOS app testing, getting ahead of criminals and identifying vulnerabilities before they cause harm.
Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium
Jul 26, 2023

Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium

See how to set up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass iOS jailbreak detection.
Investigating iOS Phishing Using Virtualization Technology
Jun 27, 2023

Investigating iOS Phishing Using Virtualization Technology

By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Jun 09, 2023

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Jun 08, 2023

Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled

Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.
iOS Database Storage with Corellium
May 26, 2023

iOS Database Storage with Corellium

When conducting a mobile app security assessment, testing iOS database storage is critical. Learn how to test iOS app data storage in the DVIA-2 application.
Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
May 05, 2023

Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers

Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.