
In previous article, we’ve shared a wide range of tools for sub-domain enumeration which helps pentesters and bug hunters collect and gather subdomains for the domain they are targeting. Enumeration is the most important thing you can do, at that... Read more

In the days gone by, monitoring smartphones was something known only to the spy agencies or tech geeks. It was not only expensive for a common man but the results were also unsatisfactory. Thankfully, surveillance technology has come a long... Read more

Initially, the penetration tester needs to acquire or gather all the possible relevant information about the main domain that a particular organization uses. When information gathering is complete, the tester can look into the subdomains that the organization uses. There... Read more

The compromise of passwords is always a serious threat to the confidentiality and integrity of data. Generally, the passwords shorter than 7 characters are especially susceptible to bruteforce attack. However, a sequence of mistyped commands or incorrect login responses (with... Read more
Recent Comments