VerSprite Shares Cybersecurity News & Security Research VerSprite Shares Cybersecurity News & Security Research

VerSprite Security Resources

Security Metrics Rehab

8 November 2014

This presentation addresses rehabilitating CISOs to better understand how to employ enterprise security metrics that matter.

Read more

arrow right
avatart

posted by Versprite


iOS Reverse Engineering: Part Two – Debugging and Tracing with LLDB

23 October 2014

In part two of this blog series, we will demonstrate iOS reverse engineering by using LLDB to perform basic debugging and message tracing.

Read more

arrow right
avatart

posted by Versprite


Import TAM to VerSprite’s Waypoint Threat Modeling Platform

17 October 2014

VerSprite’s new Irius tool is out. This feature shows the ability to have Microsoft’s TAM tool to be imported into the threat modeling platform.

Read more

arrow right
avatart

posted by Versprite


iOS Reverse Engineering: Part One – Configuring LLDB

5 October 2014

In this post, we will show you how to configure an environment and learn the basics for reverse engineering iOS applications. We will be configuring LLDB…

Read more

arrow right
avatart

posted by Versprite


Experiments with JSON-IO, Serialization, Mass Assignment, and General Java Object Wizardry

15 August 2014

My focus is currently on Java libraries that support the serialization of objects into JSON, and JSON back into objects.

Read more

arrow right
avatart

posted by Versprite


Quick and Dirty Web Services Testing with Suds and Burp Suite

16 July 2014

This is a really simply example of using the Python Suds library to consume and inspect SOAP web services with integration into Burp Suite.

Read more

arrow right
avatart

posted by Versprite


Unsafe Application State Restoration (iOS)

23 June 2014

Unsafe Application State Restoration actually mean essentially means a mobile application saves the state of a view location that is only presented to…

Read more

arrow right
avatart

posted by Versprite


Application Security On A Dime

3 April 2014

This presentations covers Application Security on a Dime: Open Tech, Tools, and Techniques for Running a Blossoming InfoSec Program.

Read more

arrow right
avatart

posted by Versprite


Exploiting XML Serialization in Python

28 March 2014

Lately I have been really interested in XML serialization vulnerabilities. There has already been some eye opening research into the vulnerabilities…

Read more

arrow right
avatart

posted by Versprite


Airmail 3 Android Mobile Security Attack Surface Continuous Integration & Continuous Delivery (CI/CD) Control Frameworks Cybersecurity Data Encryption Data Security Breach Digital Footprint Enterprise Data Security Exploitation of Vulnerabilities Exploit Development Frida Engage Global Threats Google Security InfoSec JavaScript JEA Just-Enough-Administration MacOS Malware Protection & Detection Man-in-The-Middle (MiTM) Attacks Multi-Factor Authentication PCI DSS Compliance Phishing Point-of-Sale Security Privacy Risk Python Remote Attack Reputational Risk Reverse Engineering Risk Analysis Security Awareness Training Security Controls Security Vulnerabilities Social Engineering Statistical Findings & Security Metrics The General Data Protection Regulation (GDPR) Threat Intelligence Threat Library Threat Modeling Transport Layer Security (TLS) Vendor Risk Web Application Security Windows Vulnerabilities XPC Services API

We are an international squad of professionals working as one.

logos