Bluetooth Vulnerability: Implications and Mitigations for Android, macOS, iOS, and Linux Devices
I.Introduction Bluetooth has become an integral technology for billions of smartphones, computers, wearables, and other devices to connect and exchange data over short distances. With…
Common Challenges In Android Penetration Testing
Android penetration testing is a crucial aspect of ensuring the security of Android applications and devices. As the popularity and adoption of Android continue to…
Android Pentesting Using Frida
In this blog, we were going to see what Frida is and how to set it up in our systems. We will also perform android…
Using SecLists for Penetration Testing
Introduction to SecLists Seclists is something that comes very handy to a pen tester. The simple reason is, it has a collection of all the…
Android Weak Host Validation
In this blog we are going to discuss about android weak host validation and see how android application is not validating weak host for the…
STATIC ANALYSIS OF ANDROID APPLICATION
Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many users are unaware of their…
Android Penetration Testing with Drozer
Introduction to Android Application Security Testing Framework – Drozer: Drozer is an android application security testing framework which is developed by FSecureLABS that makes it…
Attacking Android Components – Content Providers
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What are Content Providers and…
DROZER – Android Security Assessment Framework
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security assessment tools available for Android…
ASSET SECURITY
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (23)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (3)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (42)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (43)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)