Hours of Experience
Applications Tested
Cups of Coffee
Projects
Latest Blog posts
How to build a highly available, highly scalable AWS secure cloud? – PART I
0 CommentsIntroduction Architecture introduces best practices to build highly available, scalable, manageable and secure web application on Amazon…
Read MoreBypassing Application Whitelisting Solution SolidCore Part I
0 CommentsBypassing anti-virus has become fairly simple in the malware world today. As a result, companies are beginning…
Read MoreHow to build a highly available, highly scalable AWS secure cloud? – PART II
0 CommentsThe scope of this post will be to discuss the security features provided by AWS. Now that…
Read MoreDecryptor for Wanacry Ransomware
0 CommentsWannaCry A ransomware that is exploiting “ETERNALBLUE” a vulnerability found in the NSA exploits released by the…
Read MoreDirty COW Vulnerability (CVE-2016-5195)
0 CommentsRecently Security Researcher has uncovered an critical vulnerability in 2.6.22 versions(which was released in 2007) of Linux Platform and Android Platform. In…
Read MoreAT&T Arbitrary Code Execution Vulnerability
0 CommentsRecently, I found an interesting issue Remote Code Execution for AT&T bug bounty program. But before going into this…
Read MoreWindows Mobile Application Security – Part II
2 CommentsNow Next Step accessing application internal storage Accessing Internal Storage of APPLICATION using reg eDITOR Application Windows…
Read MoreWindows Mobile Application Security – Part I
0 CommentsWe need access to internal storage of device to proceed with security testing, however,Windows devices don’t allow users…
Read MoreMongoDB Security Review Document
0 CommentsWe are happy to announce Security Review guidelines for MongoDB. CIS guidelines are not available for Mongo…
Read MoreDisable IIS 8.0/8.5 Banner Information
0 CommentsBelow are the steps of how to fix the banner (version information) in IIS 8.0/8.5 Step 1:…
Read More