Posted in Penetration Testing

Vulnerabilities Assessment vs Penetration Testing

In this post, I would like to share the difference between Vulnerabilities Assessment vs Penetration Testing during real-life security testing. However, some organizations might want…

Continue Reading...
Posted in Mobile

PhoneSploit Android Mobile Debug Tool

PhoneSploit is a new tool that would be exploiting Android Mobile Devices by using Android Debug Bridge (ADB). The tools can be running within the…

Continue Reading...
Posted in Application

Pentest Tool Framework

Pentest Tools Framework is a Penetration Testing tool that uses several exploits database with scanners. The interface looks identical to Metasploit with a simple type…

Continue Reading...
Posted in Penetration Testing

Privileges Escalation for Linux and Windows Operating System

What is Privileges Escalation For those are not very familiar with Privilege Escalation, it is an act of exploiting vulnerabilities or bug where the attacker…

Continue Reading...
Posted in Penetration Testing

Active Directory Penetration Testing

Active Directory Penetration Testing normally covers exploiting misconfiguration within the Active Directory(AD). I’m still in the progress of learning Active Directory Penetration Testing so let…

Continue Reading...
Posted in Penetration Testing

AWS Penetration Testing Review

What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in…

Continue Reading...
Posted in Penetration Testing

XML Injection Attack review

In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar…

Continue Reading...
Posted in Coding

Penetration Testing with Perl Language

Previously, I have published a post that related to Python Penetration Testing where I will be sharing about Penetration Testing using Perl Language this round….

Continue Reading...
Posted in Penetration Testing

Penetration Testing using Python Code

Nowadays, programming is considered as a very important element in the industry especially IT. In this post, I would like to share a brief knowledge…

Continue Reading...
Posted in Information Security

OS fingerprint method

During Penetration Testing phrase, A pentester will test the Operating System for verification usage. The method can be used for this activity such as Nmap…

Continue Reading...