Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys
Overview
Mobile applications are becoming more resilient to reverse engineering and tampering with all kinds of client and server-side protections, binary hardening, code obfuscations, SSL pinning, etc which makes it that much more difficult for good...
blog.dixitaditya.com6 min read