SQL Injection Masterclass

In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I mentioned above is SQLi which also known as SQL Injection. […]

Wireshark Masterclass

Wireshark is very popular among Security Professional especially Network Engineer and Pentester. The reason is that Wireshark can be used for Network Packet Analyzer. For those who are not familiar with Network Packet Analyzer, it […]

TLS Downgrade Attack

We will focus on TLS Downgrade attack method in this post where we will learn about what and how to detect the attack. TLS Downgrade attack is an attack that leverages a leak of side-channel […]

One-Time Password for Time-Based

For those who do not know about Time-Based One-Time Password, it’s a password that been created temporarily passcode from authentication factors algorithms. The algorithms will be generated and send to the user immediately for them […]

Mobile Security Framework for Mac OS

For those who are not familiar with Mobile Security Framework, this tool is an automated tool that been used for (Android/IOS/Windows) Mobile Penetration Testing. What this tool will be focusing on is a thing like […]

Owasp ZAP – Another Alternative Web Pentest Tools

For those Security professionals especially involved in Penetration Testing should know Burpsuite and Acunetix for Web Application Assessment. However, there is an alternative for them to use while doing Web Application Assessment which is Owasp […]

Shodan CLI

Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method for the Shodan Usage which it will be using Command-Line. […]

CyberSecurity Risk for Vendor Management

When talking about Vendor Security, we will be thinking about building an ecosystem where the vendor will cross path with enterprise or management to bridge the matrix by using the latest technology. Latest Technology such […]

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send crafted data to the memory and executed the arbitrary code […]

Local File Inclusion

For those are not familiar with Security Assessment, An attack method called Local File Inclusion where it will exploit any vulnerable inclusion procedure that been implemented inside the application. The attacker can use this method […]