Bypassing anti-virus has become fairly simple in the malware world today. As a result, companies are beginning to realize that application whitelisting is another tool to consider adding to their...
WannaCry A ransomware that is exploiting “ETERNALBLUE” a vulnerability found in the NSA exploits released by the ShadowBrokers. The WannaCry ransomware attack was a worldwide cyberattack by the WannaCry ransomware...
Recently, I found an interesting issue Remote Code Execution for AT&T bug bounty program. But before going into this let’s understand Arbitrary Code Execution – Arbitrary Code Execution also know as command...
Now Next Step accessing application internal storage Accessing Internal Storage of APPLICATION using reg eDITOR Application Windows do not allow access to the internal storage of its application even with...
We need access to internal storage of device to proceed with security testing, however,Windows devices don’t allow users access to its internal storage. Naturally, for accessing internal storage we need unlocked Windows...
This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology Introduction of DirectAccess From the Wikipedia definition DirectAccess, also known...
Hi all, Recently i have found Insecure Direct Object Issue on Nokia. I have already reported this issue and also got fixed. Thanks to Nokia developer Team. They have listed...
Most Commented Posts