Android Pentesting Using Frida
In this blog, we were going to see what Frida is and how to set it up in our systems. We will also perform android…
Using SecLists for Penetration Testing
Introduction to SecLists Seclists is something that comes very handy to a pen tester. The simple reason is, it has a collection of all the…
Android Weak Host Validation
In this blog we are going to discuss about android weak host validation and see how android application is not validating weak host for the…
STATIC ANALYSIS OF ANDROID APPLICATION
Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many users are unaware of their…
Android Penetration Testing with Drozer
Introduction to Android Application Security Testing Framework – Drozer: Drozer is an android application security testing framework which is developed by FSecureLABS that makes it…
Attacking Android Components – Content Providers
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What are Content Providers and…
DROZER – Android Security Assessment Framework
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security assessment tools available for Android…
ASSET SECURITY
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…
Security Orchestration Automation and Response (SOAR)
Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle it adequately, most of the…
Best Practices – BYOD and Mobile Device Security
BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or USB drives to the workplace….
Categories
- Android Security (17)
- Authentication & Authorization (22)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (5)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (13)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (31)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (30)
- Governance Risk & Compliance (7)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (18)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (9)
- Past Events (6)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (31)
- Security Best Practices (40)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Upcoming Events (1)
- Viruses & Malware (15)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (7)