What are IoT Security Challenges?

Internet of things (IoT) is the network of devices connected over the internet which enables them to communicate with each other and exchange data over the network.  Internet of things has gained the attraction of many researchers. A huge amount of research has been done by experts and researchers to improve the privacy and security […]

XSS Auditor no more part of Google Chrome

Yes, you heard correct Google Chromium devs announced the news about XSS auditor. The XSS auditor time and again bypassed by the client security researcher to execute the malicious javascript, and this may be the primary reason to be deprecated and removed from the Google Chrome browser. The anti-cross site scripting engine (XSS auditor) is […]

SecureLayer7 at RISE Conference, Hong Kong 2019

RISE Conference Hong Kong 2019 is Asia’s largest tech conference, and SecureLayer7 is selected in the Alpha program. At SecureLayer7, we decided to release our signature two products at RISE 19 conference as below mentioned. 1) Watch7 AuthSafe The SecureLayer7’s Watch7 AuthSafe is user and entity behavior analytics which gets integrated with applications. AuthSafe provides […]

Exploring, Exploiting Active Directory Pen Test

Active Directory (Pen Test ) is most commonly used in the Enterprise Infrastructure to manage 1000’s of computers in the organization with a single point of control as “Domain Controller”. Performing Penetration Testing of Active Directory is more interesting and are mainly targeted by many APT Groups with a lot of different techniques. We will […]

Gratis Winter Pen Test 2019 Program

Overview : Free Penetration Testing For Open Source Application. We love to help to secure Open Source application and that’s a primary reason every year we provide the free Free Penetration Testing of the open source application. Under the Gratis Pentest in last 3 years, we have evaluated security postures of open source applications such as- Refinery […]

My Six Months Journey in SecureLayer7

Before I step into the new year, I would like to share about my delightful journey in SecureLayer7, in short SecureLayer7 Review. Six months back, I had completed my graduation and was looking forward to start my career in the Information Security industry. I was guided by my friend, @rakeshnagekar who holds six years of […]

SecureLayer7 at Japan’s Code Blue International Conference, Nov 2018.

Hey there, I wanted to talk about my experience at SecureLayer7 at Japan’s Code Blue International Conference, Nov 2018. I’m a Security Consultant at SecureLayer7 who is an Information Security enthusiast with keen interest in learning latest technologies along with playing CTFs’.I learnt that SecureLayer7 is one of the sponsors for the Code Blue International […]

Abusing SUDO Advance for Linux Privilege Escalation – RedTeam Tips

Abusing SUDO Advance for Linux Privilege Escalation If you have a limited shell that has access to some programs using thesudocommand you might be able to escalate your privileges. here I show some of the binary which helps you to escalate privilege using the sudo command. If you already read my previous article(Abusing Sudo) then you can skip […]

Fileless malware- the ninja technique to spread malwares using default os tools

What are fileless malwares? Fileless malware are not typical malwares that probe directly or indirectly to install software on a victim’s machine and then execute. Instead, tools that are built-in to Windows are hijacked and used to carry out attacks. Why is it more dangerous? Due to the usage of only default windows tools, no […]