• Our Services
  • Knowledge Centre
  • About
  • Contact
  • Our Services
    • Adversary Simulation
    • Application Security
    • Penetration Testing
    • Response
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Contact
  • Adversary

    Adversary Simulation

    Our best in class red team can deliver a holistic cyber attack simulation to provide a true evaluation of your organisation’s cyber resilience.

  • Application Security

    Application
    Security

    Leverage the team behind the industry-leading Web Application and Mobile Hacker’s Handbook series.

  • Penetration Testing

    Penetration
    Testing

    MDSec’s penetration testing team is trusted by companies from the world’s leading technology firms to global financial institutions.

  • Response

    Response

    Our certified team work with customers at all stages of the Incident Response lifecycle through our range of proactive and reactive services.

  • Research

    MDSec’s dedicated research team periodically releases white papers, blog posts, and tooling.

  • Training

    MDSec’s training courses are informed by our security consultancy and research functions, ensuring you benefit from the latest and most applicable trends in the field.

  • Insights

    View insights from MDSec’s consultancy and research teams.

  • OpenSSL ‘heartbleed’ CVE-2014-0160 Analysis

    Awaiting Image

    Apr 10th, 2014

    Written by: Admin

    News

    This week, the OpenSSL security team announced a high-risk vulnerability within a TLS extension of the popular open-source cryptography toolkit. The original advisory can be found here. The advisory indicates that a missing…

  • Hooking SQLCipher Crypto Keys with CydiaSubstrate

    Feb 13th, 2014

    Written by: Admin

    Mobile

    Security conscious developers often turn to SQLCipher [1] to encrypt content stored on a device’s file system. SQLCipher is a slightly extended version of SQLite, which allows 256-bit AES encryption…

  • VoIP Attacks: Skype Proof of Concept Released

    Jan 24th, 2014

    Written by: Admin

    News

    In October 2013, Dominic Chell and I (Shaun Colley) presented our research and proof-of-concept tool for traffic analysis of encrypted VoIP streams. We focused on Skype as a case study….

  • Practical Attacks Against Encrypted VoIP Communications

    Awaiting Image

    Oct 22nd, 2013

    Written by: Admin

    Exploitation

    At HackInTheBox KUL 2013, we demonstrated two possible techniques that could be used to perform side channel attacks on packet captures of encrypted VoIP communications. The two techniques, Dynamic Time…

  • Introducing Mobile AppArmour

    Awaiting Image

    Feb 15th, 2013

    Written by: Admin

    News

    Overview Threats to mobile apps are well documented, as are the risks posed from jailbreaking, rooting and malware. As we place an increasing level of trust in mobile apps, we…

  • No source? No problem…

    Jul 16th, 2012

    Written by: Admin

    News

    When performing any kind of product assessment, it is always preferable to have the source code. However, in the real world we all know that this isn’t always possible and…

  • BlackHat USA 2012 – MDSec’s WAHH Live Training

    Jul 8th, 2012

    Written by: Admin

    News

    MDSec will be delivering the WAHH live training course at BlackHat USA again this year. The course syllabus follows the chapters of the Second Edition of The Web Application Hacker’s…

  • Introduction to iOS Platform Security

    May 10th, 2012

    Written by: Admin

    Mobile

    This if the first in a series of blog posts about iOS and iOS platform security, encompassing and expanding on the MDSec iOS Application (In)Security whitepaper. In this post, MDSec…

  • iOS Application (In)Security Whitepaper

    Awaiting Image

    May 2nd, 2012

    Written by: Admin

    Mobile

    Today MDSec released a whitepaper detailing some of the vulnerabilities we’ve observed over the past year while performing regular security assessments of iPhone and iPad applications. This whitepaper details some…

  • Beyond the OWASP Top 10

    Awaiting Image

    Apr 2nd, 2012

    Written by: Admin

    News

    We recently had the pleasure of presenting at OWASP Ireland. The following talk discusses some of the issues we’ve identified during pentests that don’t easily slot in to the categories…

Page 13 of 14First«12 13 14»

Recent Posts:

  • Function Peekaboo: Crafting self masking functions using LLVM
  • How Scattered Spider Exploited Weak Links in UK Retail Security
  • Red Teaming with ServiceNow
  • Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)
  • Nighthawk 0.3.3 – Evanesco

Archive:

  • October 2025
  • March 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024

Page Links:

  • Responsible Disclosure Policy
  • Nighthawk
  • Privacy Policy
  • MUTUAL NON-DISCLOSURE AGREEMENT
  • Home
  • Our Services
    • Adversary Simulation
      • Red Team Operations
      • Purple Teaming
    • Application Security
      • Application Security
      • Large Language Models
      • Mobile Security
    • Penetration Testing
      • Infrastructure Security
      • Product Assessment
      • Cloud Security Assessment
    • Response
      • Retained Response
      • Emergency Response
      • Cyber Readiness
  • Knowledge Centre
    • Insights
    • Research
    • Training
  • About
  • Careers
  • News
  • Contact
MDsec

Services

  • Adversary Simulation
  • Application Security
  • Penetration Testing
  • Response

Resource Centre

  • Research
  • Training
  • Insights

Company

  • About
  • Contact
  • Careers
  • Privacy

t: +44 (0) 1625 263 503
e: contact@mdsec.co.uk

32A Park Green
Macclesfield
Cheshire
SK11 7NA

Accreditations

Best
IT Health Check Service
Crest Star
Crest
Cyber Essentials
British Assessment Bureau
Copyright 2026 MDSec