Fahad HasanJailbreaking iOS 15.0 — iOS 16.6.1Hola amigo! If you’re seeking resources to jailbreak iOS 15 or 16, you’ve come to the right place. In this article, we’ll delve into key…Mar 29Mar 29
Fahad HasanUnveiling Critical Bug Using Directory Search — Bug Bounty Tip!Directory search involves the systematic exploration of a web application’s file structure to uncover hidden paths, files, or directories…Nov 27, 20231Nov 27, 20231
Fahad HasanReconnaissance Is The Key — Bug Bounty Tip!Reconnaissance, or information gathering, is a crucial phase in finding vulnerabilities because it lays the foundation for a successful…Nov 11, 2023Nov 11, 2023
Fahad HasanAndroid Penetration Testing — Part 2 (Assessment of Application)In this phase, we will assess our vulnerable mobile application to identify potential security weaknesses. This exercise serves a dual…Sep 9, 2023Sep 9, 2023
Fahad HasanMobile App Penetration Testing — Part 1 (Setup)Mobile apps are vulnerable to various security risks and threats due to their connectivity, complexity, and the sensitive data they often…Sep 9, 20231Sep 9, 20231
Fahad HasanGetting Started with Web Application Security Testing Using Burp SuiteIn an era where digital landscapes dominate business operations, the security of web applications has become a critical concern. A single…Aug 17, 2023Aug 17, 2023