How to Root an Android Device

The term “root” comes from the linux and is used to describe a user who has “super user” permissions to all the files and programs in the OS. If your Android device is not rooted then you won’t have permissions to excute any files in the OS. You may get an error as “access denied […]

Reverse Engineering an apk file

Android is a most popular mobile platform. Many organizations are using their own applications for android. Similar to web applications android applications also requires penetration testing. Forward Engineering in the android is the process of converting source code to a machine code. Source code -> Javac -> classes.dex Reverse Engineering in the android is the […]

Skype Forensics

Skype is a free Instant messenger and video chat. It is very popular tool because we can call to any person and chat with them anywhere in the world. Most of the smart phone users are installed the Skype in their mobile devices. Through that they can communicate with their friends, relatives and working professionals. […]

Thick Client Application

Thick client or fat client or Heavy weight application is a client in client-server architecture. This is completely independent on the server. Most of the process is done by client application. Thick client application is application it needs to install on the client side machine. It interacts with the server for a periodic connection. Whereas […]

Hack LinkedIn Account from Android mobile device

LinkedIn is a business-oriented social networking service. It is mainly used for professional networking. LinkedIn is a directory of professionals and companies. Individuals and companies use LinkedIn for networking, job searching, hiring, company research, and connecting with affiliates, including alumni, industry, and a variety of other business related groups. Do you really think LinkedIn safe? […]

Session Puzzling

It is an application level vulnerability that the attacker can perform variety of malicious activities. Mainly this vulnerability happens that the application session variable is using more than one purpose, so this is called session variable overloading or session puzzling. This attack is to access application entry points. While exploiting session puzzles, the session objects […]