[email protected] 9019854583
Process-of-Rooting

Process of Rooting

Rooting is the process which allows the users of smartphones, tablets and other devices running the Android operating system to gain privileged access also known as root access over various Android subsystems.

Web-Cache-Poisoning

Web Cache Poisoning

Web cache poisoning has long been an elusive vulnerability, a 'theoretical' threat used mostly to scare developers into obediently patching issues that nobody could actually exploit.

WAF

WAF evasion Techniques #3

In the last two articles of this series of "Web Application Firewall (WAF) evasion techniques", we have looked at how to bypass a WAF rule set exploiting a Remote Command Execution on a Linux system by abusing of the bash globing process.

USB-DROP-ATTACK

USB DROP ATTACK

A USB drop attack occurs when an attacker strategically places a USB device somewhere, potentially containing malicious code, with the intention of someone taking it and plugging it into a computer.

Bypass-UAC

Bypass UAC in windows 10

User Account Control (UAC) is a Windows feature that helps to prevent unauthorized changes to the system. This blog will show how a threat actor can silently execute privileged actions that modify the system while bypassing this security control.