Posted in Penetration Testing

Vulnerabilities Assessment vs Penetration Testing

In this post, I would like to share the difference between Vulnerabilities Assessment vs Penetration Testing during real-life security testing. However, some organizations might want…

Continue Reading...
Posted in Penetration Testing

Privileges Escalation for Linux and Windows Operating System

What is Privileges Escalation For those are not very familiar with Privilege Escalation, it is an act of exploiting vulnerabilities or bug where the attacker…

Continue Reading...
Posted in Penetration Testing

Active Directory Penetration Testing

Active Directory Penetration Testing normally covers exploiting misconfiguration within the Active Directory(AD). I’m still in the progress of learning Active Directory Penetration Testing so let…

Continue Reading...
Posted in Penetration Testing

AWS Penetration Testing Review

What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in…

Continue Reading...
Posted in Penetration Testing

DLL Attack Review Part 1

I would like to share a few details and tricks to DLL Attack that can be useful to some people out there. DLL (Dynamic Link…

Continue Reading...
Posted in Penetration Testing

XML Injection Attack review

In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar…

Continue Reading...
Posted in Penetration Testing

Penetration Testing using Python Code

Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge…

Continue Reading...
Posted in Penetration Testing

Cross-origin resource sharing Review

Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to…

Continue Reading...
Posted in Penetration Testing

Tutorial on GraphQL Injection

Recently, I have learned a few new injection attacks and one of them is GraphQL Injection. Before we understand how the attack works, we need…

Continue Reading...
Posted in Penetration Testing

Cross-Site Scripting Tutorial

Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the…

Continue Reading...