Hacking Wireless Doorbells

As technology continues to advance, so do the methods used by hackers and security enthusiasts to explore vulnerabilities in everyday devices. One such device that has attracted the attention of hackers is the wireless doorbell. In this blog, we will dive into the world of hacking wireless doorbells, exploring the process of reverse engineering the...

10 Reasons Why Pen Testing Should Be a Priority

As technology develops and cyber threats become more advanced, organizations must take preventive steps to secure their sensitive data and infrastructure. One such measure is penetration testing, commonly known as pen testing. In this blog, we will explore what pen testing is, why it is important, and the numerous benefits it offers to organizations. What...

Understanding XML External Entity Injection (XXE) Attacks

XML External Entity Injection (XXE) is a critical web security vulnerability that can expose applications to various risks. In this comprehensive guide, we will delve into the intricacies of XXE attacks, including what they are, how they arise, different types of XXE attacks, and effective prevention strategies. By the end of this article, you will...

Windows Antivirus Evasion – Part 1

In today’s digital landscape, protecting our systems from malicious threats is of utmost importance. Antivirus software plays a significant role in defending against various forms of malware.   However, cybercriminals are constantly evolving their techniques to bypass these security measures. One such method in Windows Antivirus evasion is DLL Injection, which involves manipulating a process to load...

Intercepting Implicit Intent to Load Arbitrary URL

In the world of Android app development, intents play a crucial role in facilitating communication and interaction between different components within an app and even between different apps. Intents can be categorized into two types: explicit and implicit. While explicit intents have a specific receiver and are delivered to a predetermined component, implicit intents leave...

A Guide to Pen Testing in the Azure AD Environment

Azure Active Directory (Azure AD) is a cloud-based identity and access management service provided by Microsoft. It plays a vital role in the Azure environment, serving as the cornerstone for authentication and authorization across Azure services. Azure AD allows organizations to manage and secure user identities, enforce access policies, and enable single sign-on to various...

7 Essential Steps for an Effective Yearly Penetration Testing Plan

Embarking on a journey to fortify your digital defences against cyber threats requires a well-crafted and comprehensive yearly penetration testing plan. In this blog, we’ll explore the seven essential steps that form the backbone of an effective strategy to ensure the security of your organization’s digital assets.   Understanding Penetration Testing (Pen Test)  Penetration testing (pen...

Cross-Site Request Forgery (CSRF) for Pen Testers

As Pen Testers, one of our main roles are identifying and mitigating vulnerabilities that could lead to security breaches. Cross-Site Request Forgery (CSRF) attacks often go undetected but have severe repercussions if left unaddressed; we will explore this attack type further in this blog and examine their fundamentals as well as understand their significance as...

HTTP Parameter Pollution: Manipulating Web App Vulnerabilities 

HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers to manipulate or retrieve hidden information by injecting encoded query string delimiters into existing parameters of web applications. This vulnerability arises when user input is not adequately encoded for output by the web application. HPP can impact both GET and POST requests, making it...