No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Creating rogue WiFi AP using WiFi-pumpkin & Bettercap and performing SSL Man in the middle attack (MITM)
In my laptop, I have two wifi interfaces wlan0 and wlan1. I am using wlan1 to create rogue AP and wlan0 is connected to the internet which will be ultimately used to provide internet connectivity to rogue AP. You can also use ethernet interface to provide internet...
Axis Bank Mobile Application’s SSL validation flaw case study
In this case study, we tested several applications and libraries against different Man in The Middle Attack (MITM). One interesting finding is about Axis Bank Mobile Application. We found out that its SSL Certificate Validation is completely broken. Lab Setup We...
Stylesheet limit in Internet Explorer 9
SYMPTOMS:- Styles on a webpage are missing or look incorrect when the page loads in Microsoft Internet Explorer version 6 to 9. Note This problem can occur whether the webpage uses an inline style sheet or points to a cascading style sheet. You may also receive the...
Squid proxy setup, Blank Screen Issue with Youtube videos
Lately, we were setting up a youtube video caching and proxy server using squid in our project. By the time we were done with configuration, everything worked like charm and a lightweight proxy was set up in no time. Rules were written in the config to allow youtube...
Code Climate – Automated Checks for quality of Code
As per Wikipedia Static program analysis is the analysis of computer software that is performed without actually executing programs. In most cases, the analysis is performed on some version of the source code. WHY USE STATIC CODE ANALYSIS? Not every software developer...