Blog
Home / Blog

Kerberos Attacks- Part 1
Kerberos Attacks- Part 1 December 21, 2022 Active Directory Shashikant Prasad As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used

Dependency Confusion Attack and its Mitigation
Dependency Confusion Attack and its Mitigation December 19, 2022 Software Supply Chain Kunal Kumar In this blog, we will discuss Dependency Confusion attacks and ways

Seven Common Web App Vulnerabilities
Seven Common Web App Vulnerabilities December 06, 2022 Web Application Tarak Sakhardande Web applications are essential to our daily lives but pose a significant security

Why Healthcare Industry Needs Pentesting?
Why Healthcare Industry Needs Pentesting? December 05, 2022 Informational Atharva Nanche In recent years, the cyber threat to the healthcare industry has increased dramatically. This

Windows UAC Bypass
Windows UAC Bypass November 28, 2022 Red Team Kunal Kumar What is UAC? UAC (User Account Control) is a windows security feature that forces any

What is PCI DSS Pentesting?
What is PCI DSS Pentesting? November 21, 2022 Informational Siddharth Johri Payment Card Industry Data Security Standard (PCI DSS) is a set of rules designed

A Complete Guide to Phishing Simulation with Gophish
A Complete Guide to Phishing Simulation with Gophish November 17, 2022 Red Team Redfox Security Team What is Phishing? Phishing is a social engineering attack

Integer Overflow in Smart Contract
Integer Overflow in Smart Contract November 05, 2022 Smart Contract Redfox Security Team Overflow and Underflow are the two forms of flow in blockchain. When

Exploiting Broadcast Receivers
Exploiting Broadcast Receivers November 04, 2022 Android Redfox Security Team What are Broadcast Receivers? A broadcast receiver is a component in Android applications that allows

Exploiting Content Providers
Exploiting Content Providers October 26, 2022 Android Redfox Security Team In the previous blog, we described the Drozer tool; in this blog, we are going

OSINT with Maltego
OSINT with Maltego October 18, 2022 OSINT Redfox Security Team What is Maltego? Maltego is an application for data mining that mines open-source data sources

Android Pentesting with Drozer
Android Pentesting with Drozer October 15, 2022 Android Redfox Security Team In this blog, we are going to discuss the Drozer tool for pen-testing Android