Blog
Home / Blog

Why do we need a Web App Pen test
Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Top 5 Reasons Why You Need a Penetration Test
High-profile security breaches are still making news in today’s media. A growing number of organizations are at danger because of this development. While adversaries are

Android Root Detection Bypass Using Bypass
This is a continuation of the previous blog post – see SSL Pinning Bypass for Android Apps. If you haven’t already, please go check it

WI-FI Hacking (Pt. 2)
In our previous blog post (Part 1) of the Wi-Fi Hacking series, we went through setting up our Alfa card, decloaking hidden SSID’s, passively capturing

SSL Pinning Bypass for Android using Frida
What is SSL pinning? Mobile apps commonly use SSL to safeguard transmitted data from eavesdropping and tampering while communicating with a server. SSL implementations in

Misconfigured Amazon S3 Buckets
What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

NGINX Zero-Day Vulnerability 1
What is NGINX ? NGNIX is an open-source web server that can also act as a reverse proxy, load balancer, mail proxy, and HTTP cache.

Benefits of Penetration Testing
Synopsis Breaking into a company’s security defenses takes a long time and skill. However, modern techniques make it easier than ever for threat actors to

Wifi Hacking (Pt.1)
Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Spring4Shell Vulnerability
Synopsis A sequence of Tweets (that are now deleted) from a Chinese Twitter account was posted on March 29th, 2022, displaying pictures of a new

Hacking GraphQL (Part 3)
In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack. In Part 3, we’re going to try to exploit the SQLi

Server-Side Request Forgery
SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target