Android Application Penetration Testing Part 3
In my last article( Android Application Penetration Testing Part 1 ), ( Android Application Penetration Testing Part 2 )we had look at basic architecture and penetration testing tools. Now Let’s dig deeper with ADB.Android Debug BridgeAndroid Debug Bridge (ADB)...
Web Application Attacks – Types, Impact & Mitigation – Part-2
With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2 we are covering the following attacks.Session FixationFrame InjectionDirectory Listing EnabledQuery Parameter Sent In Get RequestInadequate Account Lockout and session...
Android Application Penetration Testing – Part 7
In the Last Part, Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10.INSECURE LOGGING- ADB Logcat:Logcat is a command-line tool that dumps a log of system messages, including stack traces when...
Android Application Penetration Testing Part 2
With my last article(Android Application Penetration testing Part 1) we had look at the basic architecture of the Android device. Now Let’s collect some Android Application Pentesting tools and build setup for hacking:There are many tools for an android...
Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide
Cyber Security operations center is protecting organizations and the sensitive business data of customers.It ensures active monitoring of valuable assets of the business with visibility, alerting and investigating threats, and a holistic approach to managing risk.Analytics service can...
Android Application Penetration Testing – Part 1
Android security testing is more often used by security industries to test the vulnerabilities in Android applications.After web applications, the more concern area is mobile application penetration test Let’s start with some basics.Also, we recommend you take the...