Menu

Close
  • Home
  • Resources
  • Linux Commands
Subscribe
Menu

nfc

A 2-post collection

Page 1 of 1

Creating a malicious mobile app environment - Part 2 of 2

In part one we walked through the process of creating the first two phases of the mobile app environment. If you haven't already done so, you »

Chris Young Chris Young on social engineering, mobile security, msc project, nfc, qr codes, wifi pineapple, android 24 October 2017

Creating a malicious mobile app environment - Part 1 of 2

This article (part 1 of 2) is based around my final submission from my MSc project that I completed last year(2016). A lot has changed »

Chris Young Chris Young on social engineering, mobile security, android, msc project, wifi pineapple, nfc, qr codes 13 October 2017
Page 1 of 1
Information Security Consultant | Pen tester © 2022
Proudly published with Ghost