The Serial Notes lab provides an opportunity to explore and gain insights into data deserialization processes within iOS applications, showcasing how vulnerabilities in these processes can potentially lead to Remote Code Execution (RCE).
The Time Trap lab allows for a deeper understanding of injection vulnerabilities and highlights the importance of intercepting traffic when analyzing an iOS application to achieve code execution.
The Gotham Times lab offers a deep dive into how webviews function in iOS and how vulnerabilities in them can be exploited using deep links, in this case to steal a session token via open redirect.
The Cyclic Scanner lab offers a fascinating look into Android vulnerabilities, particularly focusing on exploiting a code execution flaw within an Android service employing a vulnerable handler.
The IOT Connect lab make us exploring a vulnerable broadcast receiver within an Android application, allowing interaction with IOT devices without permission.