PinnedAttacks to be performed Using Hping3 (Packet Crafting)What is Packet Crafting?Aug 30, 20201Aug 30, 20201
PinnedUnveiling Vulnerabilities: A Deep Dive into Firmware Penetration Testing- Part 1In the ever-evolving landscape of cybersecurity, staying one step ahead of potential threats is crucial. Firmware security is one area…Sep 19, 20233Sep 19, 20233
PinnedAWS Vulnerability Assessment and Penetration Testing Checklist- Part 1In this blog, I am sharing my experience with AWS vulnerabilities that have been identified during AWS security testing. I have seen a less…Jun 24, 20221Jun 24, 20221
PinnedSubdomain Discovery- Black Box TestingA subdomain is basically an additional part of your domain. So here I am going to perform subdomains discovery and why do we need…Jan 1, 2021Jan 1, 2021
Published inOSINT TeamHow to Perform Penetration Testing for Gaming Consoles PS4, PS5, XBOX Applications?Hello everyone, I’m writing this post because I know there isn’t much content available for it. The purpose of this post is to discuss my…Apr 222Apr 222
NO One Tell YOU | Secret AWS Vulnerabilities -Part 3“Starting AWS Checklist Part 3 Summary”Feb 201Feb 201
Android Application Security Testing Part -1Android penetration testing is finding security flaws and vulnerabilities in an Android mobile application or device to ensure its…Apr 13, 2023Apr 13, 2023
Android Application Testing Approach and Common Attacks/ToolsAndroid penetration testing is finding security flaws and vulnerabilities in an Android mobile application or device to ensure its…Apr 1, 2023Apr 1, 2023
AWS Vulnerability Assessment and Penetration Testing Checklist- Part 2In this blog, I am sharing my experience with AWS vulnerabilities that have been identified during AWS security testing. I have seen a less…Oct 7, 2022Oct 7, 2022