Dynamic Analysis
Bypassing an App’s PIN Protection with cycript
**NOTE: The app being analyzed is not my own, and therefore I have left out any identifying information. This is just a walkthrough of the steps one can take to search for similar vulnerabilities. This walkthrough will show how to Read more…