Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide
Cyber Security operations center is protecting organizations and the sensitive business data of customers.It ensures active monitoring of valuable assets of the business with visibility, alerting and investigating threats, and a holistic approach to managing risk.Analytics service can...
Android Application Penetration Testing Part – 4
As per my last article(Part 1), ( Part 2), (part-3) we had a look at basic architecture and penetration testing tools and ADB. Now let’s see some entry points for Android application Penetration testing.From the perspective of security, the manifest file...
Android Application Penetration Testing Part 3
In my last article( Android Application Penetration Testing Part 1 ), ( Android Application Penetration Testing Part 2 )we had look at basic architecture and penetration testing tools. Now Let’s dig deeper with ADB.Android Debug BridgeAndroid Debug Bridge (ADB)...
Web Application Attacks – Types, Impact & Mitigation – Part-2
With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2 we are covering the following attacks.Session FixationFrame InjectionDirectory Listing EnabledQuery Parameter Sent In Get RequestInadequate Account Lockout and session...
Android Application Penetration Testing – Part 7
In the Last Part, Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10.INSECURE LOGGING- ADB Logcat:Logcat is a command-line tool that dumps a log of system messages, including stack traces when...
Android Application Penetration Testing Part 2
In my last article(Android Application Penetration Testing Part 1) we had look at the basic architecture of the Android device. Now Let’s collect some Android Application Pentesting tools and build a setup for hacking:There are many tools for an...