Pentest Tool Framework

Pentest Tools Framework is a Penetration Testing tool that uses several exploits database with scanners. The interface looks identical to Metasploit with a simple type of UI/UX design for beginner usage. The function that been […]

Let’s Encrypt revoke the certification

Due to the software bug, Let’s Encrypt will revoke around 3 millions of certification today. The software bug that been discovered on their backend’s code will impact the Certificate Authority Authorization (CAA) check that resides […]

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key that can be used in […]

Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they ignore the network protection. A […]

Cyberattack via Whatsapp

Recently, Cybersecurity people and companies will take serious notice of the latest hacking event that happens within this week such as Whatsapp Hack. A group of hackers has been targeting an amount of 1,400 from […]

IDA 7 Guide

In this post, I would like to talk about IDA 7 tools which are been used for reverse engineering application The tools have been developed by Hex-Rays, a private organization independent of governmental agencies and […]

TLS Downgrade Attack

We will focus on TLS Downgrade attack method in this post where we will learn about what and how to detect the attack. TLS Downgrade attack is an attack that leverages a leak of side-channel […]

One-Time Password for Time-Based

For those who do not know about Time-Based One-Time Password, it’s a password that been created temporarily passcode from authentication factors algorithms. The algorithms will be generated and send to the user immediately for them […]

Riltok Trojan

Kaspersky researchers did found a money-stealing mobile malware where it can launch new variants of malware to the smartphone device The malware have extend their target to Europe from Russia.  The Riltok have first discovered […]