In this article we will get to know about passwords and various ways to pen test them. We will also cover things like where passwords are stored in windows/linux, common attacks and good password hygiene to follow. Also, some points to consider in a password pentest.

What is a password:

A password is a secret series of characters allowing a user to access a computer, program or a file. A super secure password has all of following features:

  • Letters: Can be English or other language and mixture of small and capital letters. A-Z and a-z
  • Numbers: any combination from 0–9

In our daily lives, we use to carry out most of the work through mobile applications. Nearly 67% of the total world’s population uses mobile applications. Taking such a need, every company is getting in the need to develop mobile applications, but it is not a simple process. It takes a lot more and most importantly a clear strategy by which applications can be designed accordingly.

Mobile App Development takes a deep process through which each application needs to pass out to characterize the standards that are required for mobile application development. …


With developing technology every minute, we are getting aided to such technology and it has made our lives easier. The way of representation of things has totally evaluated and it has really impacted our personal and professional lives. Considering a professional one, our way of working has been impacted a lot and all of our work is considered to be through digital mode. Websites are considered to be the general part of any business that depicts regular information about the business and its components.

The website depicts the whole identity of the business that consists of all the features which…


With the development of technology from day by day, we are totally getting dependent on such technologies as it makes work easier and saves a lot of time. With such convenience, there comes a risk whether the device we use is safe or not, or if our data is not getting monitored by some unwanted person? Attacks can be whether implied by internal sources or by external sources, both can do harm to your system and data as well. These things imply a great effect on the system and integrity, the confidentiality of the data gets compromised. Cyber Security is…


Whenever we think of getting to any business or we have to search for any brand, we go for the website. Website is the common entity you can find anywhere if you want to have a good position in the present market. It can be a good source for users to interact and serve as a business. For that much, the website needs to have that much content and features that can attract customers well and hit first when searched for the particular query. All these things are very important in a website if it is designated to be taken…


Ethical Hacking includes a systematic approach to find the vulnerabilities in a system with the consent of the user. Doing an ethical hack includes copying systems and activities of malevolent aggressors. This training assists with recognizing security weaknesses which would then be able to be settled before a noxious assailant has the chance to misuse them.

Otherwise called “white caps,” ethical programmers are security specialists that play out these evaluations. The proactive work they do assists with improving an association’s security act. With earlier endorsement from the association or proprietor of the IT resource, the mission of ethical hacking is…


Ethical Hacking, otherwise called infiltration testing or pen testing, is lawfully breaking into PCs and gadgets to test an association’s guards. It’s among the most energizing IT occupations any individual can be associated with. You are in a real sense getting paid to stay aware of the most recent innovation and will break into PCs without the danger of being captured.

Organizations draw in moral programmers to recognize weaknesses in their frameworks. From the entrance analyzer’s perspective, there is no drawback: If you hack in past the current safeguards, you’ve allowed the customer to close the opening before an assailant…


Geeting Everyone ! Hope everything Is going good Today in this blog we will Go through Blind XSS As our Previous blog we discussed what is xss and how it work in this blog we will Go through Blind XSS cross site Scripting .

Deep dive Into Sensitive data exposure !

geeting Everyone ! Hope all going good in this blog we will discuss CWE-200: Exposure of Sensitive Information How This issue critically cause Impact For Our web application , android application etc.

Different Usage Of netcat(nc) for Penetration Testing

greeting Everyone! Hope All is going good today in this blog we are going to Learn How to Utilize Your Testing work using nc…


There has been an enormous increase within the number of corporate web applications over the past few years, thanks to its several benefits like simplicity, simple access, cost-effectiveness, and adaptability to access resources from any a part of the planet . The emergence of Web 2.0 that facilitates interactive information sharing has entirely revolutionized the web and today it’s employed by most of the enterprises to market their products and services. Enterprises that specialise in the newest trends like Web applications and introduce apps that facilitate information sharing, collaboration and integration are witnessing good amount of success.

But, the main…


The United Arab Emirates is known to be one of the fine countries in the world. UAE is located at the East end of the Arabian Peninsula. Dubai is the most attractive city that this country attains. Dubai is one of the famous cities in the world whether it be the sky touching buildings, innovative technologies, the way of living of people, etc. However, people from other countries come here in hope of a good life and earning. They live far from their families and mobile phones are the only options that can make them feel nearer to their families…

Securium Solutions Pvt Ltd

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store