With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to […]
Active Directory (Pen Test ) is most commonly used in the Enterprise Infrastructure to manage 1000’s of computers in the organization with a single point of […]
Cross Site Scripting (XSS) is the most popular web application vulnerability. It is a code injection attack that allows attackers to execute malicious JavaScript code in […]
Today we are going to learn about the Drozer! The game changer tool for android Pentesting. Drozer(Mercury) is the pentesting framework for the android. Drozer allow […]
With the increasing popularity of Android apps, it’s crucial to ensure the security of these apps and the sensitive data they handle. Penetration testing plays a […]
APIs (Application Programming Interfaces) are a crucial component of modern software systems, enabling different applications to interact with each other and share data seamlessly. However, just […]
Basic Understanding of Command and Control Malware Server
Reading time: 8/10 minutes Folks!! In this blog, I will talk about Command and Control Servers (C&Cs) and diverse procedures utilized by “assailants” “attacker” to fabricate a powerful and […]
Before I step into the new year, I would like to share about my delightful journey in SecureLayer7, in short SecureLayer7 Review. Six months back, I […]