Build an IOS pentesting lab via XCode Simulator
This blog is written by our student Pranav Sharma. Doing an iPhone pen-testing can be a tedious task in itself […]
This blog is written by our student Pranav Sharma. Doing an iPhone pen-testing can be a tedious task in itself […]
Introduction As Kerberos is an authentication protocol it is possible to perform brute-force attacks against it (providing we are careful). […]
I have recently published a blog post on use of .XAMLX files to execute command on an IIS based application. […]
For a security enthusiast, a rooted android device is essential to perform dynamic assessments of android applications. They either rely […]
One might think that we are done with the static analysis of the application, but it is not so. We […]
.IPA is the package file for an iOS application. The difference being that an .IPA file can only be installed […]
This Blog explains the methods to analyze and investigate the potential security loopholes in an iOS application. In order to […]
WHAT IS CERTIFICATE PINNING? Certificate pinning is the process of associating a host with their expected X.509 certificate or public […]
(((0x1 :- Basic Recon Stage))) -1 union all select 1,2– -1 union all select null,2– null union all select 1,null– […]
Introduce This is the walkthrough of all Natas CTF challenges from 1 to 34. (34 is still a placeholder as […]
WhatsApp us for trainings & demos