Blog
Home / Blog

Kerberos Attacks- Part 1
As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Dependency Confusion Attack and its Mitigation
In this blog, we will discuss Dependency Confusion attacks and ways to exploit them. What is a Dependency Confusion Attack? Dependency confusion is an attack

Seven Common Web App Vulnerabilities
Web applications are essential to our daily lives but pose a significant security risk. Cybercriminals are always looking for ways to exploit vulnerabilities in web

Why Healthcare Industry Needs Pentesting?
In recent years, the cyber threat to the healthcare industry has increased dramatically. This new era of digitization has brought many benefits to the healthcare

Windows UAC Bypass
What is UAC? UAC (User Account Control) is a windows security feature that forces any new process to run in non-elevated mode by default. Any

What is PCI DSS Pentesting?
Payment Card Industry Data Security Standard (PCI DSS) is a set of rules designed to keep credit cardholder information safe. It is an operational prerequisite

A Complete Guide to Phishing Simulation with Gophish
What is Phishing? Phishing is a social engineering attack used to obtain user information such as login credentials and credit card information. It happens when

Integer Overflow in Smart Contract
Overflow and Underflow are the two forms of flow in blockchain. When a single numerical computation is performed, the output exceeds the maximum that a

Exploiting Broadcast Receivers
What are Broadcast Receivers? A broadcast receiver is a component in Android applications that allows the system to send events to applications that are not

Exploiting Content Providers
In the previous blog, we described the Drozer tool; in this blog, we are going to discuss Content Providers. What are Content Providers? Content Providers

OSINT with Maltego
What is Maltego? Maltego is an application for data mining that mines open-source data sources and generates graphs for relationship analysis. The graphs simplify the

Android Pentesting with Drozer
In this blog, we are going to discuss the Drozer tool for pen-testing Android applications. What is Drozer? The Android evaluation tool, Drozer, was introduced