The article will explore various strategies for reversing firmware, with some examples. Finally, some best practices are mentioned.
Embedded Systems and Firmware
Embedded systems are everywhere, in mobiles, cameras, TVs, smart […]
This article is about exploring major security issues we come across during assessment of Ajax based applications.
A digital forensic investigation generally consists of five major steps :
A brief about various Linux tools available:
There are multiple Linux tools used for imaging and […]
What is the cloud, anyways?
The term is new, but concept is not. Throughout the history of computing, IT organizations have been using their own infrastructure to host applications, data, […]
This article shows a practical example of what is proxy chaining in a web proxy tool and how proxy chaining can be used to overcome limitations of web proxy […]
This article is an introduction of packing, how to unpack, to reverse an exe and finally patching it. I have chosen to show reversing of a sample exe file […]
This article is about different code review techniques and their application in the real world
What you will learn:
What is secure code review and how to deal with them in […]
In this article, we’ll discuss THE steps involved in performing A security assessment of an Android based application. We will see the use of various tools and methodologies and […]
Introduction to Arbitrary File Download
Difference between Arbitrary File Download and LFI/ RFI
How it is exploited- a real example
What you should know:
Basic Web related concepts
What is Arbitrary […]