Category: Masterclass
Reversing Mobile Application
Reversing Mobile Application would be a normal progress to those who are doing Mobile Penetration Testing. However, the objective of this post is for others…
Business Continuity Plan Review
As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization…
SQL Injection Masterclass
In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I…
Wireshark Masterclass
Wireshark is very popular among Security Professional especially Network Engineer and Pentester. The reason is that Wireshark can be used for Network Packet Analyzer. For…
TLS Downgrade Attack
We will focus on TLS Downgrade attack method in this post where we will learn about what and how to detect the attack. TLS Downgrade…
Mobile Security Framework for Mac OS
For those who are not familiar with Mobile Security Framework, this tool is an automated tool that been used for (Android/IOS/Windows) Mobile Penetration Testing. What…
One-Time Password for Time-Based
For those who do not know about Time-Based One-Time Password, it’s a password that been created temporarily passcode from authentication factors algorithms. The algorithms will…
Owasp ZAP – Another Alternative Web Pentest Tools
For those Security professionals especially involved in Penetration Testing should know Burpsuite and Acunetix for Web Application Assessment. However, there is an alternative for them…
Shodan CLI
Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method…
CyberSecurity Risk for Vendor Management
When talking about Vendor Security, we will be thinking about building an ecosystem where the vendor will cross path with enterprise or management to bridge…
Recent Comments