Browsing: HowTo

HowTo Android Security

Android Application Penetration Testing – Part 5

Android Components Three of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent. Activating Components Intents bind individual components to each other at…

HowTo SecNews24.com

Web Application Attack and Audit Framework (w3af)

w3af is an open source web application security scanner which enables developers and penetration testers to distinguish and exploit vulnerabilities in their web applications. This tool also provides GUI framework…

HowTo Wireshark

Dissecting TLS Using Wireshark

The primary goal of the Transport Layer Security protocol as defined in RFC 2246 (TLS version 1.0) is “to provide privacy and data integrity between two communicating applications.” The TLS…

HowTo Application

Android Application Penetration Testing Part – 4

As per my last article(Android Application Penetration testing Part 1), (Android Application Penetration testing Part 2), (Android Application Penetration test part-3) we had look on basic architecture and penetration testing tools…

HowTo Android Security

Android Application Penetration testing Part 3

With my last article(Android Application Penetration testing Part 1), (Android Application Penetration testing Part 2)we had look on basic architecture and penetration testing tools. Now Let’s dig dipper with ADB…

1 2 3