Press enter to confirm search term

Blog

Red Team

05.04.19

What is Red Team?

Unlike a traditional penetration test, Red Team aims to simulate a real world attack by expanding the scope of the engagement to include the entire organisation.


By Kimi
Web Application

05.04.19

What is Web App Pentesting?

Web Application Penetration Testing is a process in which we use penetration testing and security skills to find different vulnerabilities in web applications.


By Manik Arora
Network

05.04.19

What is Network Security?

Network Security (often referred as network pentesting or network VAPT) is a specilized job to ensure security and compliance of your organization's information stack.


By Manik Arora
Wireless

05.04.19

What is Wireless Pentesting?

Wireless Penetration testing is the Actively Examine the Process of Information security Measures which is Placed in Wireless Networks and also analyses the flaws.


By Manik Arora
Mobile

05.04.19

What is Mobile Pentesting?

Mobile Pentesting contain Application Run time Analysis, Traffic & Encryption flaws, Insecure Storage, Code Signing, Memory Protections, Fuzzing and Exploitation.


By Manik Arora
VAPT

05.04.19

What is VAPT?

Vulnerability Assessment and Penetration Testing is a test that have different strengths and are often combined to achieve a more complete vulnerability analysis.


By Manik Arora
Writeup

12.02.19

SHELL-CTF 0x01 Writeup?

In this post, we are going to describe solutions to the Shell CTF 2019 Organized by SHELL Community, along with AXIS, VNIT Nagpur.


By Bhav Karan
Writeup

09.02.19

KRACK-JIIT CTF Writeup?

In this post, we are going to describe solutions to the KRACK-JIIT CTF 2019 Organized by JIIT Open Dev Circle (jodc).


By Bhav Karan