Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they ignore the network protection. A […]

Penetration Testing using Python Code

Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge about Penetration Testing using Python code which can be useful […]

Password Security

Nowadays, the user has to be careful when choosing the password for any system or device to avoid. I would advise that the user need to be putting a strong password which contains requirement such […]

OS fingerprint method

During Penetration Testing phrase, A pentester will test the Operating System for verification usage. The method can be used for this activity such as Nmap and TTL response where it will provide details of the […]

Cross-origin resource sharing Review

Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it will run the Cross-origin rules […]

Tutorial on GraphQL Injection

Recently, I have learned a few new injection attacks and one of them is GraphQL Injection. Before we understand how the attack works, we need to first understand what is GraphQL is. GraphQL is an […]

Cross-Site Scripting Tutorial

Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the application. An example of common Cross-Site Scripting that I do […]

Penetration Testing SSL

In this post, I will talk about how to test the SSL vulnerabilities that reside on the system or server. For those who are still new in this area of Security, SSL Vulnerabilities can be […]

Reversing Mobile Application

Reversing Mobile Application would be a normal progress to those who are doing Mobile Penetration Testing. However, the objective of this post is for others to learn reversing mobile application. The tools that you will […]

Business Continuity Plan Review

As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous delivery of the Business Continuity […]