Build an IOS pentesting lab via XCode Simulator
This blog is written by our student Pranav Sharma. Doing an iPhone pen-testing can be a tedious task in itself […]
This blog is written by our student Pranav Sharma. Doing an iPhone pen-testing can be a tedious task in itself […]
Introduction As Kerberos is an authentication protocol it is possible to perform brute-force attacks against it (providing we are careful). […]
Introduction AS-REP roasting is an attack that is often-overlooked in my opinion it is not extremely common as you have to […]
Evading windows defender security is always an interesting topic for information security professionals. When designing products for securing Windows platforms, […]
In most mature environments and in most of these tests, access to command line tools is restricted. Employees typically cannot […]
Frida way:- Step 1: Install Frida on the system (Mac/Windows) and iPhone I’m using my Linux pentesting box and installed Frida using #pip […]
So what is a UDF? It is a way to extend MySQL with a new function that works like a […]
I have recently published a blog post on use of .XAMLX files to execute command on an IIS based application. […]
For a security enthusiast, a rooted android device is essential to perform dynamic assessments of android applications. They either rely […]
One might think that we are done with the static analysis of the application, but it is not so. We […]
WhatsApp us for trainings & demos