Penetration testing

Network discovery tools

Network discovery is a process of identifying or mapping internal networks. In this process, a particular computer can communicate to another computer on the

Solving the VulnOS 2 Lab

Introduction Solving laboratories is one of the best hacking practices. In a virtual machine, under a controlled environment, Penetration Testers and Securit

Injection Attacks Using DAMN Vulnerable Thick Client App

Background: In the previous article, we have seen some of the common data storage issues in Thick Client Applications specifically in DVTA. In this article,

Data Storage Issues with DAMN Vulnerable Thick Client App

Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Insecure Data Storage Background: Welcome to part-3 of thick

Discovering entry points

When people secure real world physical objects for example bank premises, they first secure obvious entry points like entrance, doors, exists and much more w

Traffic Analysis Using DAMN Vulnerable Thick Client App

Background: In the first part of this series, we have seen an introduction to Thick Client Applications, set up Damn Vulnerable Thick Client Application and

Practical thick client application penetration testing using damn vulnerable thick client app: An introduction

Though, thick client applications are not new, penetration testing process for thick clients is not as straight as Web Application Penetration testing. It is

Enumeration of Heaps, Environment Variables

Continuing with the series, in this article, we will learn about enumeration of important structures like heaps, environment variables, DLLs pointed by main

Page tables, VAD and PEB

In this part of the series, we will understand how the process can be enumerated within memory. Just as a refresher in part 1 of this series we had a look at

Penetration Testing: Covering Tracks

"Covering Tracks" is the final stage of a penetration test as a process – all the rest is paperwork. In a nutshell, its goal is to erase the digital signs le