In many situations, an application must work with web-based URLs to build and transfer session IDs, authenticate users using OAuth login, and handle other test
While testing Tenda AC5 AC1200 over at the Hacking Articles Research Lab, we uncovered several vulnerabilities in its latest firmware version V15.03.06.47_multi. Thereby in a
In the previous article, we have discussed the Lab setup of Thick Client: DVTA You can simply take a walkthrough by visiting here: – Thick
Thick client applications are not new and have been around for many years and can be still easily found within a variety of organizations. Thick
Introduction Objection is runtime mobile exploration toolkit built on top of frida which is used in Android and iOS pentesting. We can use Objection to
Let’s cover more advanced concepts and pick of where we left in part 2 of this article where we learned somehow to interact and manage
Let’s dig in deeper from the previous concepts of part 1 of this article where we learned some basic day to day commands like navigating
In the previous part, we have discussed some basic firewall policies that are must require to set up a firewall. Let’s move towards some advance
In today’s era whether your is for personal use or designated to a multi-billion-dollar enterprise, no doubt security should be the number priority out of