Home

Lo-Fi Walkthrough

cover pic

Hello, friends welcome back to my blog. Today’s blog is a walkthrough of a room from TryHackMe called Lo-FI. It’s a very basic room for Local File Inclusion (LFI), a good starting point for those who want to learn about LFI.

read more

Hammer Walkthrough

cover pic

Hello friends, welcome back to my blog.

Recently, I completed the Authentication module from the Web Application Pentesting learning path on TryHackMe. The module is excellent, and I would recommend it to anyone looking to improve their skills in web application pentesting.

read more

Setting up Vulnerable Active Directory Lab

cover pic

Hello Everyone,

I hope you’re all doing well. In this blog post, I’ll walk you through how to quickly set up a vulnerable Active Directory (AD) environment to practice your pentesting skills. We’ll be using a script called Vulnerable-AD

read more

Server Side Request Forgery (SSRF) in APIs

cover pic

Hello everyone, After successfully completing the API penetration testing course from APIsec University, I practiced API testing skills on various platforms and encountered the topic of testing for SSRF vulnerabilities in APIs. This blog aims to explain how to search for SSRF in APIs.

read more

Exploiting Broadcast Receiver-MobileHackingLabs

cover pic

Hello Guys…

In this blog, I will walk you through a challenge that I come across. It is all about exploiting a Broadcast receiver vulnerability. The challenge is from a platform called MobileHackingLabs. It’s a really good platform for testing your mobile pentesting skills. So let’s get started.

read more

Mobile Hacking Lab — Food Store walkthrough

cover pic

Hello Friends…
Today’s blog post is about a challenge created by MobileHackingLab. The challenge is called “Food Store.” The goal is to exploit a SQL injection vulnerability and gain elevated privileges within the application.

read more

API Testing — Portswigger Labs (Part 3)

cover pic

Hello Friends…

This is the Third and final part of the API testing portswigger labs series.

read more

API Testing — Portswigger Labs (Part 2)

cover pic

Greetings, friends!

I hope that you are all doing well. Today, we continue our API testing lab series, focusing on the identification and interaction with various API endpoints as well as mass assignment vulnerabilities. Let’s delve into the topic!

read more

API Testing — Portswigger Labs (Part 1)

cover pic

Hey Friends.

This blog is based on the new module API testing from Portswigger Academy. I will explain some basic theory in short points. We are mostly focused on practical labs. Let’s get started.

read more

Dumping Android application memory with Fridump

cover pic

When dealing with Android applications that handle highly sensitive information, it is crucial to ensure that the application does not store data in memory for longer than necessary. This is to prevent potential security breaches, as attackers may exploit memory dumps to access sensitive information. In this guide, we will explore the process of dumping an Android application’s memory using Fridump, an open-source memory dumping tool that utilizes Frida.

read more

Exploring Common Vulnerabilities in Android: Insecure Logging, Hardcoded Credentials, Insecure Data Storage, and Input Validation Issues

cover pic

Hello guys,

Welcome back to my blog, where today we will delve into the realm of Android vulnerabilities. In a previous post, I discussed how to set up an Android lab environment to kickstart your pentesting career. Now, let’s focus on some commonly encountered vulnerabilities found in Android applications.

read more

Android Pentesting Lab Setup: The Ultimate How-To

cover pic

Hello Friends,

In this blog, I will walk you through the practical steps to install the necessary tools for Android pentesting. By following this guide, you will be able to set up your lab environment and capture traffic using Burp Suite. So, let’s get started!

read more