PinnedAndroid Pentesting Methodology (Pt. 1)Android Pentesting Methodology Part 1 in this blog, we’ll discuss Android architecture and the different layers of Android architecture.May 27, 20221May 27, 20221
PinnedAntivirus Evasion — Part 1An Antivirus, by definition, is a software program used to prevent, detect, and eliminate malware and viruses. AVs in general use…Mar 31, 2022Mar 31, 2022
PinnedPublished inInfoSec Write-upsHacking GraphQL — Part 1In part 1 of the Hacking GraphQL series, we’re going to discuss the basics of GraphQL and how adversaries can exploit this service.Mar 25, 2022Mar 25, 2022
Published inInfoSec Write-upsAzure Privilege Escalation Via Service PrincipalIn this blog, we will look at a variation of a real-world attack path to escalate our privileges from a compromised Application…Apr 24, 2023Apr 24, 2023
Published inInfoSec Write-upsDocker Hardening Best PracticesDocker has gained immense popularity in recent times due to its containerization capabilities. However, as with any widely used platform…Apr 7, 2023Apr 7, 2023
Published inInfoSec Write-upsBuffer Overflow BasicsBuffer overflow is a vulnerability where a program tries to store more data in a buffer than it can hold, potentially overwriting important…Apr 6, 2023Apr 6, 2023
Published inInfoSec Write-upsAndroid Pentesting Methodology (Pt. 2)We briefly discussed the Android architecture in part 1 of the "Android Pentesting Methodology" series. In part 2 of the same series, we…Mar 22, 2023Mar 22, 2023
Seven Common Web App VulnerabilitiesWeb applications are essential to our daily lives but pose a significant security risk. Cybercriminals are always looking for ways to…Mar 22, 2023Mar 22, 2023