In this post, I will talk about how to test the SSL vulnerabilities that reside on the system or server. For those who are still new in this area of Security, SSL Vulnerabilities can be categories as below: HeartBleed Poodle BEAST CRIME BREACH and so on […]
What is XXE Attack? The XXE Attack(XML External Entity) is an attack where it against an application that will parses XML input. Like other attack, this attack can lead to any expose any of confidential data, Denial of Service, Service Side Request Forgery. Attack Factors Exploitable […]
As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing activity STEP 1 – RECONNAISSANCE The main objective is to gather […]
What is IOT Penetration Testing? The IOT Penetration Testing is more like checking the vulnerabilities of the IOT device which it can consider as checking for any weakness on the IOT Device The advantages of IoT penetration testing is that Strengthening device security, Protecting against unauthorized […]