Explore our latest blog posts and stay secure in a digital world.
A quick blog post and reference guide to setup and getting started with Android application penetration testing.
We're thrilled to introduce BugBait to the community — a purpose-built vulnerable web application for students, developers, and cybersecurity enthusiasts to sharpen their manual hacking skills and exploit a range of vulnerabilities.
Now a days, I get very curious to look at view-source of website where Facebook’s Like button is embedded. But why should I do this? Isn’t facebook Like button trusted? This is right.. Huh!!! The answer is NO. If there is a mismatch in the domain (you are visiting) and facebook’s Like button then there is surely a problem and it is a spam page.
This is rather be a quick post and intended to be a reference note for me (and you all).
In the last 6 months, I have noticed that there is an exponential increase in hacking activities specially targeted to CMS based websites i.e. Wordpress and Joomla. Both these platforms offer business owners a comfortable base to built application within no time.
Recently, I was trying to use my previously automated Nessus Automation scripts and detected they aren’t working on latest Nessus 5.2 XMLRPC.Last time, I automated network scanning tasks using XMLRPC in Perl but strange it did not work anymore with Nessus 5.2.
We recently performed an internal network penetration test for a large enterprise with up to 3 domains and 2000+ hosts. We had zero knowledge of the target network (as an attacker would have) and were placed onto the user VLAN with unauthenticated access.
In the process of automating network scans for large networks there is a necessity to automate Nessus scans as well. The major advantage and most important point of this automation is that it allows you to do a Schedule scan in Home Feed version (which is only available in Pro feed) and the easiest part is your scans would run as if you are running from your Nessus web interface client.
The next step is to configure ModSecurity with OWASP CRS (Core Rule Set) rules.
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!