![Code/Logic Breaking with Special Characters/Symbols.](https://kunshdeep.in/wp-content/uploads/2020/10/Screenshot-35.png)
Code/Logic Breaking with Special Characters/Symbols.
Mostly Many developers while writing the code. They forgot to add regex for special characters/symbols which can break the flow/logic... Continue Reading
![Web Application Penetration Testing Checklist](https://kunshdeep.in/wp-content/uploads/2020/10/thumb.png)
Web App Penetration Testing Checklist
The below are some common checklist for web application penetration testing. Information Gathering Spiders, Robots, and Crawlers Burpsuite crawler. Check... Continue Reading
![Mobile application penetration testing](https://kunshdeep.in/wp-content/uploads/2020/10/Screenshot-31.png)
Mobile application penetration testing, and...
Why penetration testing required? Mobile applications often process any sensitive data (like user details, accessing contacts, photos, etc.), which is... Continue Reading
![](https://kunshdeep.in/wp-content/uploads/2020/10/Screenshot-29.png)
Some Useful Commands for Ubuntu...
Below are the list of commands:- Commands Command usages and details $apropos Search Help manual pages (man -k) $apt-get... Continue Reading
![](https://kunshdeep.in/wp-content/uploads/2020/10/apache_secuirty_headers.png)
Apache Security Headers Configuration.
Step 1:- Enable AllowOverride mode in config file. After successfully install the apache server open configuration file. The file location... Continue Reading
![Android Root Detection Bypass and Prevention](https://kunshdeep.in/wp-content/uploads/2020/10/Screenshot-28.png)
Android Root Detection Bypass via...
In this post, we will show you the basic steps of the root detection bypass method along with prevention implementation.... Continue Reading