Tweaking Android - Boost March 02, 2018 0 “When you modify a certain piece of hardware for better performance, it is often referred...
Recover or Shred deleted files March 02, 2018 0 Deleted Files can still be recovered. As hackers, we might have saved important/ confidential...
Android Malwares – Ghost push March 02, 2018 0 Malwares are softwares or applications which you do not want to be installed. Malwares bring...
Unlimited Game Resources and The Lucky Patcher March 02, 2018 0 Unlimited Game Resources Are you an Android Gamer? Have you ever thought...
The Deep Web – TOR Network March 02, 2018 0 “Tor is free software for enabling anonymous communication. The name is derived from...
Virtual Private Network (VPN) March 02, 2018 0 FAIR WARNING: Virtual Private Networks or VPNs might be illegal on your country. On...
Web application Cross Site Scripting (XSS) March 02, 2018 0 even though cross site scripting is more considered as a client or user based attack...
Attack Execution-Business Logic March 02, 2018 0 Attacking business logic is one of the methods used to compromise a web application...
Authorization and Attack Execution-data stores March 02, 2018 0 Authorization the process of giving someone permission to do or have something it defines...
Password management exploit March 02, 2018 0 In many situation developers do not focus on protecting privileged pages from privileged...
Web application Authentication methods March 02, 2018 0 Authentication as mentioned earlier is the process or action of proving or showing something...
intercepting messages from Flash, Java applet and Silverlight March 02, 2018 0 Browser extension that technologies permit the execution of a code in a sandbox, It...
Attack Execution the client March 02, 2018 0 1 Attack the client If the mapping and analysis level showed flaws on the client side...
Attack analyzing March 02, 2018 0 Attack analyzing stage Benefiting enumerated information to specify the...
Other source of public information March 02, 2018 0 Many information that you can benefit from are available publicly about the functionality...
Attack Mapping-Information about Intermediaries March 02, 2018 0 As part of mapping infrastructure it is important to identify any mediators like virtual...