Damn Insecure and Vulnerable Application – Part VI

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document related to deploying / using of Jadx. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device using […]

Damn Insecure and Vulnerable Application – Part V

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document on how to install Burp’s CA Certificate in an Android Device. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device […]

Damn Insecure and Vulnerable Application – Part IV

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document, which is capturing network packets. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device using android debug […]

Damn Insecure and Vulnerable Application – Part III

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualization Connecting to the android device using android debug bridge Using shell commands on the device Installing android application using adb […]

Damn Insecure and Vulnerable Application – Part II

In this post I would continue to discuss about the testing of “diva” application. Till now we have discussed about: Android Architecture Android Application Architecture Android device virtualization Connecting to the android device using android debug bridge Using shell commands on the device Installing android application using adb Knowing about the process which is executed when we click […]

Damn Insecure and Vulnerable Application – Walk-through

In this post I would be discussing about how to perform security testing on android application. And at the end of the post, a document is provided in which you would find the lab setup steps. Before understanding the security testing of android application, you must have a good understanding of the android platform & its architecture and the building blocks (components) of android […]

Incident Response: Methodology and Case Study – Part III

As mentioned in the previous post, this post would be about dynamic analysis of the darkcomet with sysinternals. At the end of the post, you can download the attached file with the steps of how to share a folder (read-only) between host and the guest virtual machine. In this post we will continue with the analysis of darkcomet on windows 7 virtual machine. I hope you might have […]

Incident Response: Methodology and Case Study – Part II

In this article, I will continue with the memory / malware analysis which have been started in the previous post. At the end of the post, you will be able to download a Volatility cheat sheet along with a document related to Sysinternals. Till now we found the following: A suspicious process, named “runddl32.exe”. When we checked for the path, it wasn’t in the System32 […]

Network Devices : A Layman’s Definition

Introduction This is the very first post in networking, which will help us to dive in the ocean called network. I would be publishing a series of posts to explain the basic concepts of networking and then we would leap in the advance level of networks and internetworks. Before learning about the network devices, lets […]