Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Security Testing » Page 2

  1. Home
  2. Security Testing
  3. Page 2

Category: Security Testing

Security Testing

The Mobile Pentesting Device: Birth of Anarchy

Part I: The Prologue – Android rooting Background In the game, Watchdogs, the hacker ‘Aiden Pierce’ uses his cell phone alone to hack into organizations […]

January 11, 2017January 9, 2025
2
Case Studies Research Security Testing

Hardware Security Module (HSM) security testing checklist

One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use it to store your debit […]

August 15, 2016January 10, 2025
4
Research Security Testing Social Engineering Tools

Exfiltration Using Powershell & Outlook

Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code was executed on the targeted […]

March 1, 2016January 21, 2025
0
Hacks Research Security Testing

Windows Kernel Exploitation

This write-up summarizes a workshop/humla conducted by Ashfaq Ansari on the basics of various kinds of attacks available for exploiting the Windows Kernel as of […]

January 29, 2016April 17, 2024
0
Security Testing

Thick Client Application Security Testing

Introduction A thick client is a computer application runs as an executable on the client’s system and connects to an application server or sometimes directly […]

December 18, 2015
3
Hacks Security Testing Web Application Security

Server Side Request Forgery (SSRF)

Introduction Is your server protected against port scanning?  The general answer will be “Yes, I have a firewall which restricts access to internal servers from […]

April 15, 2015
5
Case Studies Hacks Security Testing Web Application Security

The Lesser Known XE Attack

The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more like shortcuts to standard text […]

November 18, 2014
1
Case Studies Research Security Testing

ATM Application Whitelisting Security Assessment

During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the Windows XP ATMs of one […]

September 22, 2014January 20, 2025
0
  • 2 / 2
  • 1
  • 2

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top