blog

Our Latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Automating NMAP Capabilities
August 8, 2014
Tools & Techniques

Many times I have encountered a problem with projects where large scanning of network host is required. In that case, you simply cannot expect your consultant to scan each host individually, analyze output and list down all vulnerable ports/services. Yes..we can even detect open ports with Nessus but still it has a host limitation per scan.

Catching Back Doors through Code Reviews
July 18, 2014
Pentests

Off late, code reviews have been gaining a lot of popularity. Organizations which till recently were content with a secure network and an occasional Penetration Test are now getting their application’s code reviewed before going live.

Local Data Storage Analysis with iOS Simulator
June 30, 2014
Pentests

There have been times when a penetration tester is not able to install iOS application on a physical device while performing iOS application security assessment. This can happen due to various reasons

Malware Analysis - Does only WP installation file cleaning makes you secure?
June 2, 2014
Malware Analysis

One word answer “NO”. This is based on my experience w.r.t cleaning Wordpress (WP) sites against malware attack. Hackers mostly attack CMS based websites i.e.

Exploiting SSH key based authentication
May 23, 2014
Pentests

This is rather be a quick post and intended to be a reference note for me (and you all).

Multiple IP Nessus 5.2 Automation Script
March 17, 2014
Tools & Techniques

It is always been a pain to run Nessus when you have long list of IPs to be scanned within a short period of time. This typically happens when you are engaged in an internal pentest and you have multiple IPs to scan.

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.