Penetration testing

Enumerating Disk Artifacts in Memory

In my earlier article, I have listed out ways how to enumerate different structures like page tables, processes, VAD, PEB, etc. (For more information on thes

Intelligence Information Gathering – Collecting Twitter Followers with 25 lines of Python

Introduction Many corporations are not aware of the types of data that can be found and used by attackers in the wild. The information that you will be able

Penetration Testing Benefits: Pen Testing for Risk Management

This article explores the probable benefits which result from the relationships between penetration testing and various other mechanisms for fortifying cyber

Penetration Testing: Job Knowledge & Professional Development

Interested in starting a career in penetration testing? This is actually a good time to get in the field, as security has taken center stage in the IT activi

Automated Source Code Review for DVTA

Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: Automated Source code review Background: In the previous arti

Application Logs & Developer Backdoors

Background: In the previous article, we have discussed the basics of DLL Hijacking vulnerabilities and how one can find and exploit DLL Hijacking vulnerabi

DLL Hijacking using Damn Vulnerable Thick Client App

  Background: Welcome to the part 7 of Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App (DVTA). In the prev

Reversing & Patching .NET Applications using Damn Vulnerable Thick Client App

  Background: [pkadzone zone="main_top"] In the previous article, we have discussed how .NET applications can be Reverse Engineered using dotPeek to vie

Reversing & Decrypting Database Credentials using Damn Vulnerable Thick Client App

  Background In the previous article, we have discussed injection attacks in Thick Client Applications specifically in DVTA. In this article, we will di

Perfect SAP Penetration Testing: Threat Modeling

A penetration test is the practice of attacking an IT infrastructure to evaluate its security and determine whether malicious actions are possible. Although