Android Architecture and Pen-testing of Android applications
Introduction Android, as we are all aware, is a Linux-based operating system which was initially developed by Android Inc. and was later purchased by Google. It was designed for touch screen devices...
View ArticleApplication Security Testing of Thick Client Applications
In this article, we will learn about thick client applications, their vulnerabilities and ways to carry out security assessment of these applications. What are thick client applications? A thick...
View ArticleHacking Java Applications using JavaSnoop
Introduction: We are all aware of tools like Burp, Paros, WebInspect, etc… for intercepting web-based traffic and also for automating the security testing process. However, the same is not true for...
View ArticleSearch Engine Hacking – Manual and Automation
Introduction: We are all aware of Google/Yahoo/Bing Search engines; they need no introduction. We use them every now and then to solve our day-to-day queries. Google and other search engines use...
View ArticleSocialize & Email After Death
Social networking has become an integral part of our lives. Through social networking, we are connected to friends and family; sharing photos, gossiping, tagging photos, sharing ideas, and meeting new...
View Article
More Pages to Explore .....