
Penetration testing
Android exploitation with Kali
In this tutorial, we shall see how to create an apk file using the tools offered by Kali Linux. Kali Linux is a Linux distro with a preset of hacking tools a

Hacking
Analyzing Quantum Insert Attacks
A Quantum Insert Attack is a classic example of man-in-the-middle attacks which resurfaced into news among the top 10 biggest leaks by WikiLeaks founder Edwa

Threat Intelligence
What We Learned from APTs in the Current Year
Early this year we witnessed major IT firms suffering from data breaches of one kind or another, and they have come out in the open about the breaches, as we

Management, compliance & auditing
Enterprise Security Management
An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological an

Application security
The Mobile Device Management Saga: An SIEM (Security Information Event Management) perspective
Wikipedia defines Mobile Device Management (MDM) solutions as solutions that secure, monitors and supports mobile devices, deployed across various Mobile ser

Digital forensics
Cracking the Maze of Advanced Persistent Threats!
Advanced Persistent Threats, as the name suggests, are advanced, persistent and deadly in their nature. The ghost of APTs can affect any organization at any

Hacking
Advanced Persistent Threats – Attack and Defense
Advanced Persistent Threats (APT) was originally coined while nations were involved in cyber-espionage. These techniques are used by cyber-criminals to steal

Hacking
Google Hacking – For fun and profit - I
Google has been used ever since its beginning to find answers for most if not all of our questions from the beginning of the universe to even finding cure fo

Application security
A prototype model for web application fingerprinting: w3 scrape
Introduction: Web application fingerprinting is one of the most important aspects of the information gathering phase of ethical hacking. This allows us to n