Aditya ChauhanWhat is HTTP Cookies | 5 Methods to Exploit Cookies VulnerabilitiesHTTP cookies are small pieces of data that are stored on a user’s device by a web browser. They are used to store information about a…Apr 2, 2023Apr 2, 2023
Aditya ChauhanHow to Bypass IP RestrictionBypassing IP restriction can be done using various methods, including the use of Burp Suite, Curl, and Python. In this blog post, we will…Apr 1, 2023Apr 1, 2023
Aditya ChauhanHow To Manually Sign APK’s with keytool Jarsigner & ZipalignAs an Android developer, it’s important to know how to manually sign your APKs using keytool, jarsigner, and zipalign. This process is…Mar 28, 2023Mar 28, 2023
Aditya ChauhanActive Directory Penetration Testing TutorialActive Directory Penetration Testing | Part 1Mar 24, 2023Mar 24, 2023
Aditya ChauhanAndroid Pentesting Approach and ChecklistAs mobile devices have become an essential part of our lives, the security of these devices has become a top priority. Android is one of…Mar 24, 2023Mar 24, 2023
Aditya ChauhanActive Directory (AD) exploitation involves identifying and exploiting vulnerabilities within an…1.Password attacksFeb 21, 2023Feb 21, 2023
Aditya ChauhanBuffer overflow to RCEBuffer overflow to achieve remote code execution (RCE) is a serious security vulnerability in web applications. Attackers can exploit this…Feb 20, 2023Feb 20, 2023
Aditya ChauhanNo rate limitng over the tpOne-time passwords (OTP) are widely used for two-factor authentication (2FA) and are considered a secure way to protect user accounts…Feb 20, 2023Feb 20, 2023
Aditya ChauhanAWS PentesPerforming penetration testing on Amazon Web Services (AWS) requires a strong understanding of the platform and its security features…Feb 20, 2023Feb 20, 2023