Blog
Home / Blog

Why Healthcare Industry Needs Pentesting?
In recent years, the cyber threat to the healthcare industry has increased dramatically. This new era of digitization has brought many benefits to the healthcare

Windows UAC Bypass
What is UAC? UAC (User Account Control) is a windows security feature that forces any new process to run in non-elevated mode by default. Any

What is PCI DSS Pentesting?
Payment Card Industry Data Security Standard (PCI DSS) is a set of rules designed to keep credit cardholder information safe. It is an operational prerequisite

A Complete Guide to Phishing Simulation with Gophish
What is Phishing? Phishing is a social engineering attack used to obtain user information such as login credentials and credit card information. It happens when

Integer Overflow in Smart Contract
Overflow and Underflow are the two forms of flow in blockchain. When a single numerical computation is performed, the output exceeds the maximum that a

Exploiting Broadcast Receivers
What are Broadcast Receivers? A broadcast receiver is a component in Android applications that allows the system to send events to applications that are not

Exploiting Content Providers
In the previous blog, we described the Drozer tool; in this blog, we are going to discuss Content Providers. What are Content Providers? Content Providers

OSINT with Maltego
What is Maltego? Maltego is an application for data mining that mines open-source data sources and generates graphs for relationship analysis. The graphs simplify the

Android Pentesting with Drozer
In this blog, we are going to discuss the Drozer tool for pen-testing Android applications. What is Drozer? The Android evaluation tool, Drozer, was introduced

Introduction to OSINT
Technological breakthroughs have revolutionized the entire world into what, at present, is called the information age. One of the most important things about this age

IPV6 DNS Takeover
Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Active Directory Basics
The number of resources such as users, databases, or servers managed in organizations poses questions about accountability as firms adjust to industry needs and norms.