In this article we will get to know about passwords and various ways to pen test them. We will also cover things like where passwords are stored in windows/linux, common attacks and good password hygiene to follow. Also, some points to consider in a password pentest.

What is a password:


In our daily lives, we use to carry out most of the work through mobile applications. Nearly 67% of the total world’s population uses mobile applications. Taking such a need, every company is getting in the need to develop mobile applications, but it is not a simple process. …


With developing technology every minute, we are getting aided to such technology and it has made our lives easier. The way of representation of things has totally evaluated and it has really impacted our personal and professional lives. Considering a professional one, our way of working has been impacted a…


With the development of technology from day by day, we are totally getting dependent on such technologies as it makes work easier and saves a lot of time. With such convenience, there comes a risk whether the device we use is safe or not, or if our data is not…


Whenever we think of getting to any business or we have to search for any brand, we go for the website. Website is the common entity you can find anywhere if you want to have a good position in the present market. It can be a good source for users…


Ethical Hacking includes a systematic approach to find the vulnerabilities in a system with the consent of the user. Doing an ethical hack includes copying systems and activities of malevolent aggressors. …


Ethical Hacking, otherwise called infiltration testing or pen testing, is lawfully breaking into PCs and gadgets to test an association’s guards. It’s among the most energizing IT occupations any individual can be associated with. …


Geeting Everyone ! Hope everything Is going good Today in this blog we will Go through Blind XSS As our Previous blog we discussed what is xss and how it work in this blog we will Go through Blind XSS cross site Scripting .

Deep dive Into Sensitive data exposure !

geeting Everyone ! Hope all going…


There has been an enormous increase within the number of corporate web applications over the past few years, thanks to its several benefits like simplicity, simple access, cost-effectiveness, and adaptability to access resources from any a part of the planet . The emergence of Web 2.0 that facilitates interactive information…


The United Arab Emirates is known to be one of the fine countries in the world. UAE is located at the East end of the Arabian Peninsula. Dubai is the most attractive city that this country attains. Dubai is one of the famous cities in the world whether it be…

Securium Solutions Pvt Ltd

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store