Tutorial on GraphQL Injection

Recently, I have learned a few new injection attacks and one of them is GraphQL Injection. Before we understand how the attack works, we need to first understand what is GraphQL is. GraphQL is an […]

Cross-Site Scripting Tutorial

Cross-site Scripting is an attack where the attacker will enable to insert client-side script into the application to gain access control and data of the application. An example of common Cross-Site Scripting that I do […]

Penetration Testing SSL

In this post, I will talk about how to test the SSL vulnerabilities that reside on the system or server. For those who are still new in this area of Security, SSL Vulnerabilities can be […]

Chrome Security Browser Vulnerabilities

A few days ago, Google Chrome engineers have been scared to death when issues have been raised for all the Google Chrome browsers across all the platforms. The issues that have made Google Chrome engineers […]

Cyberattack via Whatsapp

Recently, Cybersecurity people and companies will take serious notice of the latest hacking event that happens within this week such as Whatsapp Hack. A group of hackers has been targeting an amount of 1,400 from […]

IDA 7 Guide

In this post, I would like to talk about IDA 7 tools which are been used for reverse engineering application The tools have been developed by Hex-Rays, a private organization independent of governmental agencies and […]

Android flaw exploit

Recently, there is an unpatched Android flaw like privilege escalation vulnerability has been revealed. However, it was detected on Android device that running version 8.x The exploit will give full control to the affected Android […]

Reversing Mobile Application

Reversing Mobile Application would be a normal progress to those who are doing Mobile Penetration Testing. However, the objective of this post is for others to learn reversing mobile application. The tools that you will […]

Business Continuity Plan Review

As an organization knows, there will need to active Business Continuity Plan after a disaster occurs. A Business Continuity Plan is important to any organization because it has included: Continous delivery of the Business Continuity […]

Nmap Tutorial

Nmap is a network analysis and security auditing tool which is free and open source. Nmap is used by Security Consultant as an initial reconnaissance stage of Penetration Testing. Fyodor AKA Gordon Lyon is the […]