A Redfox Cybersecurity blog on Vlan Hopping

Vlan Hopping

Introduction to VLAN Virtual LAN is a logical method of grouping Layer-2 switchports on a local switch into different broadcast domains. VLANs can help to

Read More »
A Redfox Cybersecurity blog explaining web application penetration testing and its importance.

Why do we need a Web App Pen test

Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Read More »
Part two of the two-parter blog series on wi-fi hacking from Redfox Cybersecurity.

Wi-Fi Hacking (Pt. 2)

In our previous blog post (Part 1) of the Wi-Fi Hacking series, we went through setting up our Alfa card, decloaking hidden SSID’s, passively capturing

Read More »
A Redfox Cybersecurity blog on SSL pinning bypass for Android systems using Frida.

SSL Pinning Bypass for Android using Frida

/*! elementor – v3.23.0 – 05-08-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.23.0 – 05-08-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading

Read More »
A redfox Cytbersecurity blog on misconfigured Amazon S3 Buckets

Misconfigured Amazon S3 Buckets

What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

Read More »
Part one of the two parter series blog on wi-fi hacking from redfox Cybersecurity

Wi-Fi Hacking (Pt.1)

Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Read More »