CALL US
+91 840 8891 911

social engineering - Copy

Social Engineering and How It Helped Us Find A Mole

Social Engineering is essentially the art of influencing some person into doing things that 
he may or may not do willingly ...
Read More
bug-bonty

Bug Bounty : An Introduction

What exactly is Bug Bounty ? In the Wild West, when outlaws roamed the land, local sheriffs did not have ...
Read More
Ios and iPad

Mobile Application Security Assessment – Proxying for IOS (iPhone & iPad)

After an oversight on how to set up Proxying on Android devices and emulators for Application security assessment, let us ...
Read More
insecure url

Insecure URL redirection in Google+

Our team identified a vulnerability in Google+ (Google Plus) service which can be used to perform malicious insecure URL redirection ...
Read More
http traffic

Proxying HTTP/HTTPS traffic on android

Proxying HTTP/HTTPS traffic on android - There are several stages to perform thorough penetration testing on android based application including ...
Read More
Hacking Google acc

Hacking Google account through Locked Android Devices

Hacking Google account through Locked Android Devices Varutra revealed an issue in the text message notification implementation of Google’s Android ...
Read More