Browsing tag

Checklist

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which is given for Penetration Testing. Repeatable Testing and Conduct a serious method One of the […]

Organization Cyber Disaster Recovery Plan Checklist

Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial loss of asset or business, Flood: Any unplanned event that requires immediate redeployment of limited resources is defined as cyber Disaster Recovery Plan. Types of Cyber Disaster: Natural Forces: Fire Environmental Hazards Flood / Water […]

Cloud Computing Penetration Testing Checklist & Important Considerations

Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of Cloud provider and client who earn the service from the provider. Due to impact of the infrastructure , Penetration Testing not allowed in SaaS Environment. […]

Penetration Testing Checklist for Android, windows, Apple & Blackberry Phones

Here we are going to have a look about some of Common & important  Penetration Testing Checklist for widely used OS Platforms for mobile Devices – Android, Windows, Apple, Blackberry. You can also learn Advanced Android Hacking and Penetration Testing Course online that covers lots of tools and the hands-on demos of vulnerability exploitation, real […]