<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Offensive | ConsulThink</title>
	<atom:link href="https://www.consulthink.it/category/offensive-it/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.consulthink.it</link>
	<description>IT consulting</description>
	<lastBuildDate>Tue, 19 Mar 2024 14:52:22 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.consulthink.it/wp-content/uploads/2020/02/logo-icon-87x87.ico</url>
	<title>Offensive | ConsulThink</title>
	<link>https://www.consulthink.it</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Azure Security Assessment</title>
		<link>https://www.consulthink.it/azure-security-assessment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=azure-security-assessment</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 14:47:20 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Offensive Security]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Soluzioni]]></category>
		<category><![CDATA[Consulthink]]></category>
		<category><![CDATA[Penetration Test]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security Assessment]]></category>
		<category><![CDATA[Vulnerability Assessment]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10497</guid>

					<description><![CDATA[<p>Nell&#8217;ultimo decennio l&#8217;industria del cloud computing è stata interessata da una crescita esponenziale. Secondo Exploding Topics, dal 2015 ad oggi la quantità di dati aziendali gestiti e mantenuti in cloud è raddoppiata, fino a raggiungere circa il 60% della totalità delle informazioni corporate. In particolare, circa il 22% del mercato cloud appartiene a Microsoft Azure, ...</p>
<p>The post <a href="https://www.consulthink.it/azure-security-assessment/">Azure Security Assessment</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Rustware Part 3: Dynamic API resolution</title>
		<link>https://www.consulthink.it/rustware-part-3-dynamic-api-resolution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rustware-part-3-dynamic-api-resolution</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 09 Feb 2024 10:55:00 +0000</pubDate>
				<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Offensive Security]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Rustware]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10372</guid>

					<description><![CDATA[<p>In the previous blog post we have seen how to perform a shellcode process injection by finding a target process PID using several WinAPIs, in that case all the WinAPIs were called directly. Usually malwares resolve the WinAPI address at runtime in order to hide malicious behaviours during static analysis. In this blog post we ...</p>
<p>The post <a href="https://www.consulthink.it/rustware-part-3-dynamic-api-resolution/">Rustware Part 3: Dynamic API resolution</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>iOS Strings Obfuscation in Swift</title>
		<link>https://www.consulthink.it/ios-strings-obfuscation-in-swift/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ios-strings-obfuscation-in-swift</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Wed, 17 May 2023 10:36:12 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Obfuscation]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9985</guid>

					<description><![CDATA[<p>Introduction Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’m looking for jailbreak detection mechanisms, I usually start to search for strings and functions containing the word “jailbr  (jail, jailbreak or jailbroken) or “root”. If I’m not lucky with these method names, ...</p>
<p>The post <a href="https://www.consulthink.it/ios-strings-obfuscation-in-swift/">iOS Strings Obfuscation in Swift</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
