As someone who likes to tinker with hardware, we often find ourselves opening up a device to find UART pins which are originally meant for debugging […]
With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to […]
Active Directory (Pen Test ) is most commonly used in the Enterprise Infrastructure to manage 1000’s of computers in the organization with a single point of […]
Cross Site Scripting (XSS) is the most popular web application vulnerability. It is a code injection attack that allows attackers to execute malicious JavaScript code in […]
Today we are going to learn about the Drozer! The game changer tool for android Pentesting. Drozer(Mercury) is the pentesting framework for the android. Drozer allow […]
With the increasing popularity of Android apps, it’s crucial to ensure the security of these apps and the sensitive data they handle. Penetration testing plays a […]
APIs (Application Programming Interfaces) are a crucial component of modern software systems, enabling different applications to interact with each other and share data seamlessly. However, just […]
Basic Understanding of Command and Control Malware Server
Reading time: 8/10 minutes Folks!! In this blog, I will talk about Command and Control Servers (C&Cs) and diverse procedures utilized by “assailants” “attacker” to fabricate a powerful and […]