In this article, we will go through the Android Pentesting Lab Setup. We will install the tools that will make Android … [Read More...]

Learn ethical hacking, penetration testing, cyber security, best security and web penetration testing techniques from best ethical hackers in security field.
In this article, we will go through the Android Pentesting Lab Setup. We will install the tools that will make Android … [Read More...]
This is the last article in the Buffer Overflow series. This article will cover finding the right module and then … [Read More...]
This digital world aims to provide as much feasibility to the users that they can do everything from handheld devices. … [Read More...]
Learn how hackers steal your PGP keys. What may seem secure is not always so and hackers stealing PGP keys happens all … [Read More...]
Learn how to code your own solution to CTF (Capture The Flag) exercises. After you manually solve a part of the capture … [Read More...]
Learn how to create your own social media keylogger and by extension how to defend yourself from this kind of invasion … [Read More...]
In this article, we will go through the Android Pentesting Lab Setup. We will install the tools that will make Android Pentest easier for you. We will be setting up the following tools: Android StudioAndroid Emulator (from Android Studio OR Nox)Jadx GUIMobSFadb (Android Debug Bridge)fridaBurp with Emulator Android Lab Setup Installing Android Studio We must have a way to examine, build, debug, and run the Android application. You will need to install Android Studio IDE, which you can download here. Installation is pretty simple and straightforward and you need to click Next throughout the … [Read More...]
Learn how hackers steal your PGP keys. What may seem secure is not always so and hackers stealing PGP keys happens all the time. We are here to show you exactly how they get that done. … [Read More...]
This is the last article in the Buffer Overflow series. This article will cover finding the right module and then finally, we will generate shellcode to gain shell via a buffer overflow. Recap So far we have gone through the following Buffer Overflow steps SpikingFuzzingFinding the OffsetOverwriting the EIPFinding Bad Characters Having performed these steps, we have the following information from each of the above steps TRUN is the vulnerable command (Spiking)The program crashes at around 20500 bytes (Fuzzing)We have an exact match at the offset 2003 for controlling EIP (Finding the Offset)We are … [Read More...]
Cyber Physical System (CPS) is the merger of Cyber and Physical domain. CPS involves integration of physical devices, networks, and computations. The physical devices are capable of sensing, monitoring, computing, and communicating within the defined premises. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) system are true examples of a typical CPS. Although CPS sounds more like an industrial domain, it faces serious Cybersecurity challenges due to the involvement of Cyber technology in CPS infrastructure. In this article, we shall discuss the CPS infrastructure and the … [Read More...]
This digital world aims to provide as much feasibility to the users that they can do everything from handheld devices. With this much flexibility come greater security risks. A subset of such risks lies in mobile applications (Android & IOS). We must secure these applications to make the digital world safer for everyone in the ecosystem. In this series of articles, we will discuss common Android Application vulnerabilities and how can you perform Android App Pentest to look for these vulnerabilities. In this era of technology, almost every person has a smartphone and prefers these smartphones for … [Read More...]