Posted in Vulnerabilities

Vulnerability on PHP for the year 2019

As we all know that vulnerabilities in PHP are normally mistakes made by the developer when they are writing the original code. Like Application is…

Continue Reading...
Posted in Information Security

Shodan CLI

Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method…

Continue Reading...
Posted in Vulnerabilities

Apple reward for iPhone Bug

Recently, Apple has announced that they will reward any hacker that found any vulnerability in the iPhone and Mac. Apple has put $1 Million as…

Continue Reading...
Posted in Forensic

Forensic Tools – DG WINGMAN

Recently, Digital Guardian has launched a forensic tool called DG WingMan for security professionals that involved in Forensic Area As we all know, it’s important…

Continue Reading...
Posted in Vulnerabilities

DragonBlood Vulnerability

Around this year’s April, there are five vulnerabilities known as Dragonblood that been disclosed by two security researchers. This Dragonblood is a vulnerability that related…

Continue Reading...
Posted in Information Security

CyberSecurity Risk for Vendor Management

When talking about Vendor Security, we will be thinking about building an ecosystem where the vendor will cross path with enterprise or management to bridge…

Continue Reading...
Posted in Information Security Tutorial

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send…

Continue Reading...
Posted in Information Security

Local File Inclusion

For those are not familiar with Security Assessment, An attack method called Local File Inclusion where it will exploit any vulnerable inclusion procedure that been…

Continue Reading...
Posted in Vulnerabilities

CVE-2017-11774

Introduction Nowadays, an attacker is trying to exploit an old vulnerability that been found in the year 2017 on Microsoft Outlook (CVE-2017-11774).  This malware has…

Continue Reading...
Posted in Mobile

Mobile Masterclass Part 2

Methodology of Mobile Application Penetration Testing Discovery Discovery phrase will be defined as Information Gathering phrase where it is the most important stage in any…

Continue Reading...