Enterprise security systems continue to be targeted by the meticulous and sophisticated modern-day cyber-criminal. These attacks target and exploit areas of vulnerabilities such as cloud systems, […]
Modern-day businesses continue to be afflicted by the damage caused by the rising sophistication and effectiveness of hackers. They exploit companies with inadequate and vulnerable security […]
With 2.5 billion android users across 190 countries, the digital expansion offers limitless opportunities for businesses. But along with opportunities come the challenges that plague the […]
Introduction to postMessage() The application uses the window.postMessage () method to allow cross-origin communication between different window objects. This method provides a way to circumvent the […]
What is WebSocket? Efficient two-way communication protocol WebSocket is stateful where HTTP is stateless Two main parts: Handshake and data transfer WebSockets allows the client/server to […]
FridaLab Tool, an android application specially created to hone the Frida scripting skills on android. These challenges include: Changing a hard-coded variable Modifying the return value […]
Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
Static code analysis analyses source code and identifies the bugs before the program is run. Vulnerabilities are identified in the source code through Static source code […]
Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]