iOS Pen Testing with Objection
iOS Pen Testing with Objection September 25, 2023 IoS Gaurav Choudhari In the realm of mobile app security, iOS penetration testing plays a pivotal role in identifying and mitigating vulnerabilities. This comprehensive guide combines iOS vulnerabilities with Objection, an essential tool for assessing and securing iOS applications. We will explore common iOS vulnerabilities in-depth, provide […]
Exploring Native Modules in Android with Frida
Exploring Native Modules in Android with Frida September 21, 2023 API Kunal Kumar Mobile security testing is a crucial aspect of ensuring the integrity and security of Android applications. In order to thoroughly assess an app’s security, it’s important to understand how the app’s code works, including any native modules that may be utilized. Native […]
Understanding File Upload Vulnerabilities
Understanding File Upload Vulnerabilities September 15, 2023 Web Application Tarak Sakhardande In the digital world, the practice of uploading files is a fundamental functionality across numerous websites and applications. This article delves into the realm of File Upload Vulnerabilities, a significant security concern that arises from this seemingly harmless function. This blog post presents a […]
Terminal Multiplexing: Hijacking Tmux Sessions
Terminal Multiplexing: Hijacking Tmux Sessions September 14, 2023 API Kunal Kumar Terminal sessions are a crucial part of any Linux system. Whether you’re an experienced system administrator or an aspiring Linux enthusiast, it’s crucial to understand how to manage multiple terminal sessions effectively. One tool that stands out in this regard is Tmux, a robust […]
Preventing Exploitation of Deep Links
Preventing Exploitation of Deep Links September 09, 2023 API Kunal Kumar Deep links are a powerful tool for enhancing user experience in Android applications. They allow users to navigate directly to specific content within an app, bypassing the need to navigate multiple screens. However, this convenience comes with a vulnerability that malicious actors can exploit. […]
How to Exploit Android Activities?
How to Exploit Android Activities? September 06, 2023 API Shashikant Prasad This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute, we can identify potential security risks and take appropriate measures to mitigate them. What is an Activity in the […]
Exploiting Linux Capabilities: CAP_SYS_MODULE
Exploiting Linux Capabilities: CAP_SYS_MODULE September 04, 2023 Privilege Escalation Kunal Kumar In the intricate world of Linux, system administrators often encounter security exploits that capitalize on the Linux kernel’s vulnerabilities. One such vulnerability is the CAP_SYS_MODULE privilege. This blogpost will provide an in-depth exploration of this particular Linux capability and how it can be exploited. […]
Deciphering the Threat of Tabnabbing Attacks
Deciphering the Threat of Tabnabbing Attacks September 01, 2023 Web Application Tarak Sakhardande In the vast, interconnected realm of the internet, security threats are as diverse and complex as the web itself. One such threat, often overlooked yet potentially devastating, is tabnabbing. This blog, tabnabbing attacks, aims to illuminate the obscure corners of this cybersecurity […]