Featured
A Beginner’s Guide to Smart Contracts and Solidity

A Beginner’s Guide to Smart Contracts and Solidity

In our previous blog post, The Rise of Web3.0 and Blockchain: A Beginner’s Overview we provided an insightful introduction to Web 3.0 and blockchain technology. Now, we continue our journey by exploring the intricacies of smart contract compilation. By understanding this process, you will gain valuable knowledge on how to create and deploy smart contracts effectively. Introduction Solidity is a Turing-complete, statically-typed programming language created in 2014–2015 by Gavin Wood. It is used to create smart contracts on the Ethereum … Read more

Featured
The Rise of Web3.0 and Blockchain: A Beginner’s Overview

The Rise of Web3.0 and Blockchain: A Beginner’s Overview

The internet has come a long way since its inception, and the rise of Web3.0 and blockchain technology is set to transform it yet again. In this beginner’s guide, we’ll explore what Web3.0 and blockchain are and how they’re changing the digital landscape. The internet has revolutionised the way we live, work, and interact with each other. However, as we enter the era of Web3.0 and blockchain, we’re on the cusp of a new digital transformation. In this blog post, … Read more

Featured
NoSQL injection

NoSQL injection

NoSQL database technology stores information in JSON documents instead of columns and rows used by relational databases. To be clear, NoSQL stands for “not only SQL” rather than “no SQL” at all. This means a NoSQL JSON database can store and retrieve data using literally “no SQL.” Or you can combine the flexibility of JSON with the power of SQL for the best of both worlds. Consequently, NoSQL databases are built to be flexible, scalable, and capable of rapidly responding to … Read more

Featured
LFI,RFI From Basic to Advance

LFI,RFI From Basic to Advance

In this Blog we will understand   all about directory traversal , local file inclusion and remote file inclusion from basic to advance. before reading this blog you should have some basic knowledge of php and other language like jsp, java etc. Directory-Traversal Directory traversal (also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application.  While Path/Directory Traversal may seem similar to Local File Inclusion and Remote File Inclusion, Path/Directory Traversal vulnerabilities only  allow an attacker to read a file, while LFI and RFI may also allow an attacker to execute code.  You can find  Directory-traversal as same as file inclusion vulnerabilities File-Inclusion Vulnerabilities There are two type of file inclusion vulnerabilities Local file Inclusion Remote File inclusion Local file inclusions (LFI) occur when the included file is loaded from  the same web server. Remote file inclusions … Read more

Featured
Frida Code Snippets for Android

Frida Code Snippets for Android

List Classes And Their Methods 2. Access Non Static Class Member Variable: 3. Access Static Class Member Variable 4. Get Intent Data 5. RootBear Library Root Protection Bypass Exploring Native Functions with Frida on Android Enumerate all Native library that is loaded at runtime of application 2. Enumerate all functions & Variable of the Given Module 3. Enumerate all The JNI Functions In Given module Intercept calls of the desired target function

Featured
DNS Enumeration

DNS Enumeration

Hello Folks, In this Blog, we will Discuss The DNS working and their Enumeration , DNS Zone-Transfer . and How DNS zone transfer take place Before starting we should have to know the basics of DNS. What Is DNS ? The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can … Read more

Featured
Obfuscation And Strings Encryption In Android

Obfuscation And Strings Encryption In Android

Obfuscation in computer code uses complex roundabout idioms and redundant logic to make the code difficult for the reader to understand. Obfuscation is mainly done for the purposes of security by making it obscure to avoid tampering, hide implicit values or conceal the logic used. obfuscation is a process of creating source code in a form that is hard for human to understand. Encryption is a means of securing data by encoding it mathematically such that it can only be read, or … Read more

Featured
Android Penetration Testing Precise Way

Android Penetration Testing Precise Way

Hi Friends This Blog Helps You To Learn About The Precise Path Of Android Application Penetration Testing. It Helps You To Solve some common problems that are faced while Android Application Pentesting. There Are Lots Of Blogs And Resources Available On The Internet To Conduct Android Application Penetration Testing. However, Only Some Of The Resources Guide You Precisely On The Path To Performing Android Penetration Testing.Nowadays Android Applications Are Growing Very Much, Along The Vulnerabilities Are Growing So That A … Read more

Featured
SSH And Their Working

SSH And Their Working

What Is SSH? Secure Shell (SSH), known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely Basically The SSH Command provides a secure encrypted connection between two hosts over an insecure network. This connection can also be used for terminal access, file transfers, and for tunneling other applications. Graphical X11 applications can also be run securely … Read more

Featured
Get Low Hanging Bugs with archive

Get Low Hanging Bugs with archive

What Is Web archive? Web archiving is the process of collecting portions of the World Wide Web to ensure the information is preserved in an archive for future researchers, historians, and the public. Web archivists typically employ web crawlers for automated capture due to the massive size and amount of information on the Web The Way back Machine’s automated crawlers (also referred to as spiders) can access and archive virtually any public website. However, crawlers don’t have a fixed pattern … Read more

Featured
Find Open Redirection with Gf+ffuf+qsreplace

Find Open Redirection with Gf+ffuf+qsreplace

What is Open Redirection ? Open Redirection is a security flaw in the application that cause redirection of authentic URL to another malicious URL in web application. Open redirects are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained. When And Where Happens ? Open redirection occurs when a web page is being redirected to another URL in another domain via a user-controlled input. It arises where … Read more

Encryption Reversal: Unmasking Account Takeover

Encryption Reversal: Unmasking Account Takeover

Encryption is commonly relied upon as a fundamental security measure to safeguard sensitive data in web applications. However, it is important to recognise that encryption alone may not provide foolproof protection against determined attackers. In this blog, we delve into the critical vulnerability of bypassing encryption logic, which can lead to account takeover scenarios. By shedding light on this security flaw, we aim to highlight the risks associated with solely relying on encryption and emphasise the need for additional security … Read more