Penetration testing

SSL Pinning in UWP Apps

Introduction and Background: In the previous article, we have discussed some of the common checks we need to make while testing Windows application traffic.

Intercepting Http/Https traffic of Uwp apps on Windows desktop

In the previous article of the series, we have discussed how to intercept HTTP/HTTPS traffic of Windows Phones. In this article, we will discuss how to int

Penetration Testing Resources: Practicing Skills

Penetration testing can help fortify online and offline data security, strengthen system stability and improve user privacy protocols. This is the process of

Intercepting HTTP/HTTPS Traffic on Windows Phones

Introduction and Background: In the previous article of the series, we have discussed Sideloading concepts associated with Windows Phone 8.1 apps and UWP app

DNS enumeration techniques in Linux

During the Information Gathering phase, DNS enumeration is one of the most critical steps. When we mention DNS enumeration, we are referenced to all the tech

Sideloading

Introduction and Background: In the First article of the series, we have covered the introduction and background required to start learning Windows Mobile Ap

Understanding Applications

The first article of the series covered the introduction and background required to start learning Windows Mobile Application Penetration Testing. We have al

ATM penetration testing

An ATM (automated teller machine) is a machine that enables the customers to perform banking transaction without going to the bank. Using an ATM, a user can

Reversing & patching .NET applications with ILSpy & Reflexil

In the previous article, we have discussed source code review of .NET applications. Readers are introduced to a tool called Visual Code Grepper, which can he

Introduction to Windows Mobile Application Penetration Testing

This is the first article in a series of articles aimed at discussing Windows Mobile Application Penetration Testing. Let us begin with knowing some details