December 26, 2019
Mobile device penetration Testing

Mobile device penetration Testing

In this blog, we are going to discuss the exploit scenarios to perform penetration testing for android mobile devices. Here we have categorized the penetrating testing […]
November 25, 2019
cyber risk questions

5 Security Questions You Must Answer While Briefing the Board on Cyber Risk

Are you all set to brief your board on the cyber risk of an organization? If yes, you must know how to respond to your board’s […]
October 7, 2019
penetration testing of iOS apps

A run-time approach for pen-testing iOS applications Part-II (Objection in Action)

Objection in Action Once all things go right, we can inject Frida scripts into our target application. Open target application and enter following command in powershell […]
October 7, 2019
pen testing iOS applications

A run-time approach for penetration testing of iOS apps Part-I

Hello everybody, This article will cover dynamic run-time penetration testing of iOS applications using objection framework. Objection is a run-time mobile exploration toolkit, powered by Frida. […]
September 4, 2019
IoT Security Challenges

What are IoT Security Challenges?

Internet of things (IoT) is the network of devices connected over the internet which enables them to communicate with each other and exchange data over the […]
September 4, 2019
CAN Bus protocol Penetration testing

CAN Bus protocol Penetration testing and forensics

Introduction CAN (Controller Area Network) is a vehicle bus protocol standard which allows microcontrollers and ECU (electronic control units) to communicate which each other without a […]
August 12, 2019
EEPROM without desoldering

Reading data from EEPROM without desoldering

Introduction In IoT/Hardware security it is a common practice of dumping firmware/bootloader data in order to perform reverse engineering for closed source system applications. Well, the […]
August 7, 2019
IoT Device Penetration Testing

Learn about IoT Device Penetration Testing

A year ago, when I was fresher in the term of IoT security, I was very curious about the approaches for penetration testing on smart devices.  […]
August 5, 2019
IoT device Firmware Reverse Engineering

How to Start IoT device Firmware Reverse Engineering?

IoT device Firmware Reverse Engineering:  It is a process to understand the device architecture, functionality and vulnerabilities present in the device incorporating different methods. Firmware: Piece […]
Enable Notifications.    Ok No thanks