Posted in Mobile

Mobile Security Framework for Mac OS

For those who are not familiar with Mobile Security Framework, this tool is an automated tool that been used for (Android/IOS/Windows) Mobile Penetration Testing. What…

Continue Reading...
Posted in Information Security

One-Time Password for Time-Based

For those who do not know about Time-Based One-Time Password, it’s a password that been created temporarily passcode from authentication factors algorithms. The algorithms will…

Continue Reading...
Posted in Penetration Testing

Owasp ZAP – Another Alternative Web Pentest Tools

For those Security professionals especially involved in Penetration Testing should know Burpsuite and Acunetix for Web Application Assessment. However, there is an alternative for them…

Continue Reading...
Posted in Information Security

Shodan CLI

Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method…

Continue Reading...
Posted in Information Security

CyberSecurity Risk for Vendor Management

When talking about Vendor Security, we will be thinking about building an ecosystem where the vendor will cross path with enterprise or management to bridge…

Continue Reading...
Posted in Information Security Tutorial

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send…

Continue Reading...
Posted in Information Security

Local File Inclusion

For those are not familiar with Security Assessment, An attack method called Local File Inclusion where it will exploit any vulnerable inclusion procedure that been…

Continue Reading...
Posted in Mobile

Mobile Masterclass Part 2

Methodology of Mobile Application Penetration Testing Discovery Discovery phrase will be defined as Information Gathering phrase where it is the most important stage in any…

Continue Reading...
Posted in Information Security

Access Control

What is Access Control? Access Control is a one of the central of security policy where it focuses on the control policy for the user…

Continue Reading...
Posted in Penetration Testing Tutorial

SAP Penetration Testing MasterClass

What is SAP? SAP also known as Systems, Application and Products in Data Processing owned by German company that have devoted to the business solutions…

Continue Reading...