1. Make sure that adb path is set or not. How to check path is set or not. i). Open the command prompt and type the adb Above screen shows that it is not recognized as an internal or external command. Set the path in environmental variables Go to My computer -> properties -> Advanced […]
The term “root” comes from the linux and is used to describe a user who has “super user” permissions to all the files and programs in the OS. If your Android device is not rooted then you won’t have permissions to excute any files in the OS. You may get an error as “access denied […]
Android is a most popular mobile platform. Many organizations are using their own applications for android. Similar to web applications android applications also requires penetration testing. Forward Engineering in the android is the process of converting source code to a machine code. Source code -> Javac -> classes.dex Reverse Engineering in the android is the […]
Skype is a free Instant messenger and video chat. It is very popular tool because we can call to any person and chat with them anywhere in the world. Most of the smart phone users are installed the Skype in their mobile devices. Through that they can communicate with their friends, relatives and working professionals. […]
Thick client or fat client or Heavy weight application is a client in client-server architecture. This is completely independent on the server. Most of the process is done by client application. Thick client application is application it needs to install on the client side machine. It interacts with the server for a periodic connection. Whereas […]
LinkedIn is a business-oriented social networking service. It is mainly used for professional networking. LinkedIn is a directory of professionals and companies. Individuals and companies use LinkedIn for networking, job searching, hiring, company research, and connecting with affiliates, including alumni, industry, and a variety of other business related groups. Do you really think LinkedIn safe? […]
It is an application level vulnerability that the attacker can perform variety of malicious activities. Mainly this vulnerability happens that the application session variable is using more than one purpose, so this is called session variable overloading or session puzzling. This attack is to access application entry points. While exploiting session puzzles, the session objects […]
This Blog demonstrates the recently discovered ShellShock Vulnerability (CVE-2014-6271). GNU Bash Remote Code Execution Vulnerability in Unix/Linux Environment – Which allows an attacker to gain control over a target computer if exploited successfully. This demonstration is successfully exploited by using Kali Linux.
1. Click on apps which are asking for password. 2. Go to the applock and press menu button. 3. Click on Edit menu and then delete the application. 4. Now click on apps which were asking for password. Second way: Go to Settings -> applications -> click on Applock -> forcestop.
1. Download proxydroid application from Google Play Store and install it.