Demystifying the Android Malware Read

McAfee‘s first quarter threat report stated that, with six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history. McAfee stated that Android devices are becoming malware havens with Android being the second most popular …

Tools for Reverse Engineering and Malware Analysis Read

Introduction Reverse engineering is the process of analyzing a subject system to identify the system's components and their relationships, and to create representations of the system in another form or at a higher level of abstraction. The process of reverse engineering, which …

Wi-Fi Tools Read

Wi-Fi Tools

 This section in itself may look incomplete, to have full flavor read Tech Gyan.There are many Wireless Testing tools in the wild for the different OS flavors right from Windows, Unix to Smart Phone OS.  Unix based tools remain the most popular …

BeEF (Browser Exploitation Framework) Read

What is BeEF BeEF is a Browser Exploitation Framework. It enables an attacker/pen tester to assess the security of the browser and lets him exploit it if found vulnerable. It has various uses. It can Port scan the zombie.(BeEF framework uses word …

FireCAT Read

FireCAT

Our Experience with FirefoxSome years ago we were indicated to carry out a penetration testing, in which we can't use tools, only our hands and the browser and anything installed.From that moment, Firefox became a very useful tool to carry out analysis …