Thick Client (Desktop) Application Penetration Testing – Part-2

Thick Client (Desktop) Application Penetration Testing - Part-2

Privilege Escalation using RegShot DLL Hijacking Sensitive information in Memory (Dumping connection string from Memory) Let’s try to log in with this credential using HediSQL: Remediation: Sensitive information should be encrypted. If encryption is not possible, use obfuscation techniques based on the application’s severity. Passwords In Registry Remediation: Encrypt passwords before storage, or store garbage … Read more

Most useful Linux network commands

most useful Linux Network Commands

Linux Network Commands: In the world of networking, having the right tools at your disposal can mean the difference between a smooth, seamless connection & a frustrating, time-consuming experience. While there are plenty of GUI-based network tools out there, seasoned Linux users know that the command line is often the best place to turn when … Read more

Docker Improper Write Permissions

docker improper write permissions for volumes and host filesystems

Greetings fellow Docker enthusiasts! Have you ever come across a pesky issue with docker improper write permissions for volumes & host filesystems when deploying your containers? If so, you’re not alone. This is a common problem that many Docker users face and it can be frustrating trying to figure out how to resolve it. But … Read more

Docker Minimal Base Image

docker minimal base images

Have you ever found yourself feeling weighed down by the size of your Docker images? It’s like carrying a fully loaded backpack on a hike – sure, it might have all the gear you need, but it can also slow you down and make the journey less enjoyable. That’s why we recommend using a Docker … Read more