Hello there! Today we will discuss something scary but interesting: The “Ransomware attack”. Occasionally we hear from people about their data being tied up, and it’s […]
Why Is Gartner Talking About External Attack Surface Management (EASM) In a recent report from Gartner, External Attack Surface Management (EASM) has been introduced as an […]
What is Log4J? Log4j is an open-source logging utility offered by Apache Software Foundation. This logging library is widely used by businesses in its application to […]
With 2.5 billion android users across 190 countries, the digital expansion offers limitless opportunities for businesses. But along with opportunities come the challenges that plague the […]
Introduction to postMessage The window.postMessage() method, provided by the Window interface in web browsers, serves as a pivotal tool for enabling secure cross-origin communication between distinct […]
What is WebSocket? WebSockets allow the client/server to create a bidirectional communication channel. Then the client and server communicate asynchronously, and messages can be sent in […]
FridaLab Tool, an android application specially created to hone the Frida scripting skills on android. These challenges include: In this article, I will explain each challenge […]
Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. […]
What is Android WebView? Android WebView, an android system component, allows android apps to load or display content remotely. Note: It isn’t a full fletched browser: […]