November 19, 2021
frida-tool

Sharpening your FRIDA scripting skills with Frida Tool

FridaLab Tool, an android application specially created to hone the Frida scripting skills on android. These challenges include: Changing a hard-coded variable Modifying the return value […]
November 15, 2021
penetration-test

Recon: an important part of penetration test for finding vulnerabilities

Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
November 8, 2021
android-webview

Learn about Android WebView and its Vulnerabilities

What is Android WebView? Android WebView, an android system component, allows android apps to load or display content remotely. Note: It isn’t a full fletched browser: […]
October 28, 2021
windows-active-directory

How do you set up an Active Directory in Windows

Hey guys, I hope you are doing well. Every Pentester is always keen on learning the Active directory. This article is about how we can set […]
October 19, 2021
static-code-analysis

Static Code Analysis: An important process for finding vulnerabilities

Static code analysis analyses source code and identifies the bugs before the program is run. Vulnerabilities are identified in the source code through Static source code […]
October 13, 2021
SSRF-vulnerability

Double-check Inputs to Avoid SSRF Vulnerability

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
October 8, 2021
Deserialization Vulnerability

Testing Methodology for Insecure Deserialization Vulnerability

In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]
September 27, 2021
Serialization and Deserialization

Serialization and Deserialization: Languages they work with

When an object is translated to a byte sequence, and the byte sequence can be kept on a disk or sent through streams, the process is […]
September 13, 2021
cyber security metrics

Cyber Security Metrics for Board & Risk Committee

What are cyber security metrics?  Cyber security metrics are the number of systems with known vulnerabilities.  Knowing the number of vulnerable assets in your environment is […]
Enable Notifications    OK No thanks