Blog
Home / Blog

IOS Jailbreaking
In this blog, we are going to discuss jailbreaking, its advantages and disadvantages, as well as types and the steps for carrying out a successful

PLC Hacking (Pt. 1)
Programmable Logic Controllers (PLCs) are industrial computers used to control different electro-mechanical processes for use in manufacturing, plants, or other automation environments. PLCs can range

Broken Cryptography in Android Applications
In this blog we are going to discuss Broken Cryptography in Android Applications. When application developers wish to use encryption in their apps, they have

Raspberry PI Pentest Dropbox
There are situations where On-site penetration testing is not always feasible. It’s better to go for a remote “pentest dropbox” in such cases. The pentest

Android Pentesting Methodology (Pt. 3)
Part 1 of “Android Pentesting Methodology” covered Android architecture. Part 2 covered APKs, basic app reversing, and popular debugging tools. In this blog post (part

Android Pentesting Methodology (Pt. 2)
In part 1 of the “Android Pentesting Methodology” series, we briefly discussed the Android architecture. In part 2 of the same series, we’re going to

Purdue Model for OT Security
What is OT Security? Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial

Android Pentesting Methodology (Pt. 1)
In this blog, we’ll discuss Android architecture and the different layers of Android architecture. This blog is part 1 of the “Android Pentesting Methodology” series

Why Start-ups need Penetration Testing?
The subject of whether startups require a penetration test comes up frequently when talking to entrepreneurs. Unfortunately, cyber criminals think differently. Adversaries are aware of

Hacking Electron Apps
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because node Integration in webPreferences is true). Electron Applications Electron is

Vlan Hopping
Introduction to VLAN Virtual LAN is a logical method of grouping Layer-2 switchports on a local switch into different broadcast domains. VLANs can help to

Vulnerability Scanning Vs Penetration Testing
Synopsis Organizations who don’t know the difference between penetration testing and vulnerability scanning are often losing out on an essential piece of their overall security