Tech Articles

Mobile Application Penetration testing Checklist 2016

Client Side – Static and Dynamic analysis Test Name Description Tool OWASP Applicable Platform Result Reverse Engineering the Application Code Disassembling and Decompiling the application, Obfuscation checking apktool, dex2jar, Clutch, Classdump M10 All Issue Hard-coded credentials on sourcecode Identify sensitive information on sourecode string, jdgui, IDA, Hopper M2 All Issue Insecure version of Android OS […]

Tech Articles

Anatomy of VPNs – Top 10 Facts about VPN

Hello, we’ve recently been hearing a lot of people wondering which VPN is the best for keeping your information safe. We have personally compiled the complete list of necessities for when you’re picking out which VPN you will trust with all of your sensitive data. So, a big part in choosing the right VPN is […]

Tech Articles

Kali Linux 2016.2 has been launched

As you all knows, Kali Linux is one of the best open source Operating System used by Penetration Testers and Security Experts. It has wide range of hacking and scanning tools like Password Cracking, Nessus, Nmap, Wi-Fi Cracking, Bruteforce, WLAN Exploitation, Information Gathering Etc.. Now the latest version of Kali Linux is 2016.2 so called […]

Tech Articles

A complete guide on Doxing – 2016 Tutorial

Doxing, is the term used for the process of gathering personal information on a slave/target, although this does commonly take place over the internet, this isn’t always the case. There are many methods of doxing, and various tools available over the internet. Here are the some list of websites which may be useful for you […]

Tech Articles

About Banking Malwares and its Prevention – 2016 Guide

Today we’ll discuss about the hijack method used in banking sector i.e. botnets to steal money or some sensitive information from the user. What are these botnets used for? They are used for many different purposes like gathering private details, logins to websites, credit card information, bank logins, PayPal accounts etc. If you can use […]

Tech Offers

Get .com domain for just 1$ or 67 INR – New Method 2016 Latest

Yes, 1$ .com domain offer is now back and the best thing is you can book as many domains you want to book with single account. BookMyIdentity, an ICANN accredited domain registrar that provides you quality laden yet affordable domain registration, web hosting, email hosting, website builder, website security packages & beyond! For Outside INDIA […]

Tech Articles

Checklist for performing security testing on web applications

For every businessman, development of website is much important as it acts as a  most important promotional tool for his products and services. By Developing a website means, your website should be secured enough so that no one can break it down. and for that security testing, we made one checklist in which we listed […]

Tech Articles

Every Penetration Tester you should know about this – Rules of Engagement

Penetration testing involves the use of a variety of manual and automated techniques to simulate an attack on an organization’s information security arrangements. One of the key points when managing testers is to understand what they cannot do. An individual penetration tester – however talented – is unlikely to be an expert in all the […]

Tech News

Windows 10 First Anniversary – You need to know

As you all knows, Microsoft is celebrating first year of anniversary with Windows 10 Product. We just want to thanks to your feedback, Windows is the best it can be — and getting better every day. Here are the some fun facts about windows 10 which you need to know – 1. Microsoft received approx […]

Tech Articles

How to win 100% PayPal Dispute & Chargebacks

Are you tired of losing chargebacks or just getting charged back in general? If that’s the case, We’re here to help you. We’ve been dealing with PayPal for approx more than 6 years, and in that time, we must say, chargebacks can become annoying. In this article, We will show you how to fight these […]