kalpblogger

Android Penetration Testing with Drozer

Introduction to Android Application Security Testing Framework - Drozer: Drozer is an android application security testing framework which is developed…

4 years ago

Antivirus Evasion – Part 1

1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred…

4 years ago

All you need to know about Android WebView Vulnerabilities

In this blog we are going to understand about Android WebView Vulnerabilities. What is WebView ? The WebView class in…

4 years ago

Guide to Identity & Access Management (IAM)

Introduction to Identity and Access Management Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning…

4 years ago

Ransomware and the measures to safeguard an organisation

Ransomware Attack and Its Prevention We are all aware of ransomware, as most of us, or at least someone in…

4 years ago

Intro to GraphQL – Attack Scenarios

Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing…

4 years ago

Mitigating Cross-Site Request Forgery (CSRF) Attacks

What is Cross-Site Request Forgery (CSRF)? Cross-Site Request Forgery (CSRF) is a widely known web security vulnerability that enables a…

4 years ago

WEB CACHE DECEPTION

Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of…

4 years ago

Attacking Android Components – Content Providers

In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability.  …

4 years ago

Roadmap to FedRAMP Compliance

The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server…

4 years ago