Aditya ChauhanWhat is HTTP Cookies | 5 Methods to Exploit Cookies VulnerabilitiesHTTP cookies are small pieces of data that are stored on a user’s device by a web browser. They are used to store information about a…2 min read·Apr 2, 2023----
Aditya ChauhanHow to Bypass IP RestrictionBypassing IP restriction can be done using various methods, including the use of Burp Suite, Curl, and Python. In this blog post, we will…2 min read·Apr 1, 2023----
Aditya ChauhanHow To Manually Sign APK’s with keytool Jarsigner & ZipalignAs an Android developer, it’s important to know how to manually sign your APKs using keytool, jarsigner, and zipalign. This process is…3 min read·Mar 28, 2023----
Aditya ChauhanActive Directory Penetration Testing TutorialActive Directory Penetration Testing | Part 11 min read·Mar 24, 2023----
Aditya ChauhanAndroid Pentesting Approach and ChecklistAs mobile devices have become an essential part of our lives, the security of these devices has become a top priority. Android is one of…3 min read·Mar 24, 2023----
Aditya ChauhanActive Directory (AD) exploitation involves identifying and exploiting vulnerabilities within an…1.Password attacks2 min read·Feb 21, 2023----
Aditya ChauhanBuffer overflow to RCEBuffer overflow to achieve remote code execution (RCE) is a serious security vulnerability in web applications. Attackers can exploit this…3 min read·Feb 20, 2023----
Aditya ChauhanNo rate limitng over the tpOne-time passwords (OTP) are widely used for two-factor authentication (2FA) and are considered a secure way to protect user accounts…3 min read·Feb 20, 2023----
Aditya ChauhanAWS PentesPerforming penetration testing on Amazon Web Services (AWS) requires a strong understanding of the platform and its security features…1 min read·Feb 20, 2023----