Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
  • My Tools
  • Portfolio

Month: January 2022

Posted onJanuary 28, 2022January 28, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 2 : Overview of Android Components

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 2 : Overview of Android Components

Components of Android App components are the essential building blocks of an Android app. Each component is an entry point through which the system or…

Read More
Posted onJanuary 28, 2022January 28, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 3 : Overview of Android Security

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 3 : Overview of Android Security

Introduction Android is a Linux-based operating system designed primarily for touch screen mobile devices. Android is a powerful open source operating system which runs on…

Read More
Posted onJanuary 28, 2022April 29, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 9 : SSL Pinning Bypass with Frida Server

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 9 : SSL Pinning Bypass with Frida Server
Read More
Posted onJanuary 28, 2022September 10, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 6 : Setting up Android Pentest Lab

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 6 : Setting up Android Pentest Lab

To setup Android pentest Lab we have to install following things : Virtualbox VirtualBox is used as a core by Genymotion to virtualize Android Operating…

Read More
Posted onJanuary 21, 2022April 29, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 8 : SSL Pinning Bypass with Xposed Installer

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 8 : SSL Pinning Bypass with Xposed Installer

SSL Pinning SSL Pinning is the process of associating a host with its certificate or public key. In SSL pinning a predefined digital certificate or…

Read More
Posted onJanuary 21, 2022September 10, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 5 : AndroidManifest file

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 5 : AndroidManifest file

Every APK file contains an AndroidMenifest.xml file. The manifest contains key information elements about the application, Some of them are : Application’s package name. All…

Read More
Posted onJanuary 21, 2022January 28, 2022Android Pentesting, PENTESTING

ANDROID PENTESTING SERIES PART 4 : APK File Structure

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 4 : APK File Structure

APK File Structure APK is the file format to distribute Android apps. APK stands for Android package Kit and it contain all elements the app…

Read More
Posted onJanuary 21, 2022January 21, 2022Android Pentesting, PENTESTING

Android Pentesting Series Part 1 : Android Architecture Basics

by AdminLeave a comment on Android Pentesting Series Part 1 : Android Architecture Basics

The Major components of Android platform are Linux Kernel The foundation of Android Platform is the Linux kernel. The Linux kernel will provide an abstraction…

Read More
Posted onJanuary 13, 2022January 13, 2022CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Out-Of-Band SQL Injection Explained | SQL injection Series | Web Security

by AdminLeave a comment on Out-Of-Band SQL Injection Explained | SQL injection Series | Web Security

Introduction Out-of-band Injection occurs when an attacker is unable to use the same channel like in-band injection attacks to launch the attack and gather results.…

Read More
Posted onJanuary 7, 2022June 15, 2022API Pentest, OWASP API TOP 10, PENTESTING, WEB SECURITY

API Pentesting Part 1 : Introduction to RESTful API

by AdminLeave a comment on API Pentesting Part 1 : Introduction to RESTful API

Introduction REST Stands for Representational State Transfer. It is a web standard based architecture which uses http protocol. RESTful Web Service is a lightweight, maintainable…

Read More

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning
  • Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance
  • ANDROID PENTESTING SERIES PART 7 : Static Application Analysis
  • AJAX Crash Course for WebApp Security
  • Certified Ethical Hacker Module 01 : Introduction To Ethical Hacking

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • Certification
  • EXPLOIT
  • GENERAL IT
  • InfoSec Certs.
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • Uncategorized
  • WEB SECURITY

Archives

  • September 2022
  • August 2022
  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress