Recent Posts

Posted in Vulnerabilities

Old Security Flaw Reopen on Apple iOS

Recently, Apple has released the latest version of iOS to the public but accidentally reopen an old Security Flaw in its latest version. The security…

Continue Reading...
Posted in Application

BlackEye Tool

BlackEye Tool is a Phishing Tool where it will duplicate exactly the same website such as Facebook, Google, Yahoo, Microsoft, Paypal, and so on. The…

Continue Reading...
Posted in Mobile

Mobile Security Framework for Mac OS

For those who are not familiar with Mobile Security Framework, this tool is an automated tool that been used for (Android/IOS/Windows) Mobile Penetration Testing. What…

Continue Reading...
Posted in Information Security

One-Time Password for Time-Based

For those who do not know about Time-Based One-Time Password, it’s a password that been created temporarily passcode from authentication factors algorithms. The algorithms will…

Continue Reading...
Posted in Penetration Testing

Owasp ZAP – Another Alternative Web Pentest Tools

For those Security professionals especially involved in Penetration Testing should know Burpsuite and Acunetix for Web Application Assessment. However, there is an alternative for them…

Continue Reading...
Posted in Vulnerabilities

Vulnerability on PHP for the year 2019

As we all know that vulnerabilities in PHP are normally mistakes made by the developer when they are writing the original code. Like Application is…

Continue Reading...
Posted in Information Security

Shodan CLI

Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method…

Continue Reading...
Posted in Vulnerabilities

Apple reward for iPhone Bug

Recently, Apple has announced that they will reward any hacker that found any vulnerability in the iPhone and Mac. Apple has put $1 Million as…

Continue Reading...
Posted in Forensic

Forensic Tools – DG WINGMAN

Recently, Digital Guardian has launched a forensic tool called DG WingMan for security professionals that involved in Forensic Area As we all know, it’s important…

Continue Reading...
Posted in Vulnerabilities

DragonBlood Vulnerability

Around this year’s April, there are five vulnerabilities known as Dragonblood that been disclosed by two security researchers. This Dragonblood is a vulnerability that related…

Continue Reading...