Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

Android Pentesting Methodology (Pt. 3)
Part 1 of “Android Pentesting Methodology” covered Android architecture. Part 2 covered APKs, basic app reversing, and popular debugging tools. In this blog post (part

Android Pentesting Methodology (Pt. 2)
In part 1 of the “Android Pentesting Methodology” series, we briefly discussed the Android architecture. In part 2 of the same series, we’re going to

Purdue Model for OT Security
/*! elementor – v3.23.0 – 05-08-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.23.0 – 05-08-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading

Android Pentesting Methodology (Pt. 1)
In this blog, we’ll discuss Android architecture and the different layers of Android architecture. This blog is part 1 of the “Android Pentesting Methodology” series

Why Start-ups need Penetration Testing?
The subject of whether startups require a penetration test comes up frequently when talking to entrepreneurs. Unfortunately, cyber criminals think differently. Adversaries are aware of

Hacking Electron Apps
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because node Integration in webPreferences is true). Electron Applications Electron is

Vlan Hopping
Introduction to VLAN Virtual LAN is a logical method of grouping Layer-2 switchports on a local switch into different broadcast domains. VLANs can help to

Vulnerability Scanning Vs Penetration Testing
Synopsis Organizations who don’t know the difference between penetration testing and vulnerability scanning are often losing out on an essential piece of their overall security

Why do we need a Web App Pen test
Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Top 5 Reasons Why You Need a Penetration Test
High-profile security breaches are still making news in today’s media. A growing number of organizations are at danger because of this development. While adversaries are

Android Root Detection Bypass Using Bypass
This is a continuation of the previous blog post – see SSL Pinning Bypass for Android Apps. If you haven’t already, please go check it

WI-FI Hacking (Pt. 2)
In our previous blog post (Part 1) of the Wi-Fi Hacking series, we went through setting up our Alfa card, decloaking hidden SSID’s, passively capturing