How would you get involved in this sort of security research? It's been an interest of mine for awhile. I have experience in reverse engineering binary files and malware but not so much experience in the "live internet stuff".
Would you start with simple CTF tasks?
I assume they used some sort of application to view the http requests that the phone was making and where able to figure out the right endpoints from that?
Would you start with simple CTF tasks?
I assume they used some sort of application to view the http requests that the phone was making and where able to figure out the right endpoints from that?
Thanks in advance.