Code/Logic Breaking with Special Characters/Symbols.
Mostly Many developers while writing the code. They forgot to add regex for special characters/symbols which can break the flow/logic... Continue Reading
Web App Penetration Testing Checklist
The below are some common checklist for web application penetration testing. Information Gathering Spiders, Robots, and Crawlers Burpsuite crawler. Check... Continue Reading
Mobile application penetration testing, and...
Why penetration testing required? Mobile applications often process any sensitive data (like user details, accessing contacts, photos, etc.), which is... Continue Reading
Some Useful Commands for Ubuntu...
Below are the list of commands:- Commands Command usages and details $apropos Search Help manual pages (man -k) $apt-get... Continue Reading
Apache Security Headers Configuration.
Step 1:- Enable AllowOverride mode in config file. After successfully install the apache server open configuration file. The file location... Continue Reading
Android Root Detection Bypass via...
In this post, we will show you the basic steps of the root detection bypass method along with prevention implementation.... Continue Reading