Prowler – AWS Security Assessment tools

What is Prowler? During my research on how to do an security assessment on the cloud infrastructure, i stumble with Prowler tools which been write by┬áToni de la Fuente Twitter. The origin of the "Prowler"…

CryptoJacking

Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The…

Information Gathering Method

Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some "soft skills" and social engineering method. There is a lot of choice of information gathering such as…

Penetration Testing Walkthrough

As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing…

Meltdown & Spectre Protection

Nowadays, Meltdown & Spectre issues have been spread over the world pretty quickly. As people know, Meltdown & Spectre issues can let the attacker access the sensitive information that been stored in the victim's PC…

2018 Security Prediction

The year 2017 will raise down their curtains in a few days, and we will facing a new year soon. Because of that, there are a few prediction that might occurs in the year of…

Kali Linux 2017.3

Recently, Kali Linux have released their latest version which is 2017.3. There's some update on a few tools like cuckoo, Burpsuite, Reaver and some more. However, there also a new tools added into the new…

Mobile Penetration Testing Masterclass

What is Mobile Penetration Testing? Nowadays,Mobile Penetration Testing can be considered as one of the important Penetration Testing that needed on any application or system. There have a few platform that available in the wild…