Network Scanning Network scanning refers to a set of procedures used for identifying hosts, ports and services in a network. Discovering systems on the network…
Footprinting Concepts Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. In computer…
In static application analysis the application is analyzed by looking its source code and resources for vulnerabilities, sensitive data leaks like api key, hardcoded passwords,…
Introduction AJAX stands for Asynchronous JavaScript and XML. By using Ajax, a web application can send and retrieve data from a server asynchronously (in the…
CIA Triad CIA Triad is used to avoid theft, tempering and destruction of the system. Confidentiality : Keeping system and data safe from being…
Introduction DNS is a global system for translating IP addresses to human-readable domain names. When a user tries to access a web address like “example.com”,…
Components of Android App components are the essential building blocks of an Android app. Each component is an entry point through which the system or…
Introduction Android is a Linux-based operating system designed primarily for touch screen mobile devices. Android is a powerful open source operating system which runs on…
To setup Android pentest Lab we have to install following things : Virtualbox VirtualBox is used as a core by Genymotion to virtualize Android Operating…