Tagged articles
11 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 28, 2026 · Information Security

A Complete Guide to Mobile App Penetration Testing

This article presents a thorough mobile app penetration‑testing guide covering objectives, scope, testing methods, step‑by‑step workflow, recommended tools, reporting structure, and remediation advice to help developers and security professionals secure their applications.

Dynamic analysisfuzz testingmobile app
0 likes · 11 min read
A Complete Guide to Mobile App Penetration Testing
Black & White Path
Black & White Path
Feb 25, 2026 · Information Security

AI vs Human Hackers: Who Will Dominate Penetration Testing in 2026?

A joint study by Wiz and Irregular pits leading LLM agents against a senior pentester across ten real‑world vulnerability scenarios, revealing that AI can breach nine targets at under $10 per attack yet still lags in tool usage, creative reasoning, and prioritisation, offering crucial insights for security professionals.

AI securityhuman vs AIlarge language models
0 likes · 13 min read
AI vs Human Hackers: Who Will Dominate Penetration Testing in 2026?
Black & White Path
Black & White Path
Feb 14, 2026 · Information Security

How I Uncovered Critical Vulnerabilities in an EDU Certificate Site

The author details a step‑by‑step security assessment of an EDU certificate platform, revealing edge asset discovery, unauthorized .map file leakage, arbitrary file download and upload, path‑traversal flaws, and credential exposure via Bash history, culminating in high‑severity findings.

EDU certificate sitearbitrary file uploadbash history credential leakage
0 likes · 5 min read
How I Uncovered Critical Vulnerabilities in an EDU Certificate Site
Tencent Technical Engineering
Tencent Technical Engineering
Mar 5, 2025 · Information Security

Detecting Critical AI Infrastructure Vulnerabilities with AI-Infra-Guard

As open‑source large language model tools like Ollama, OpenWebUI and ComfyUI gain popularity, numerous security flaws such as unauthenticated APIs, CVE‑exploits, model theft and remote code execution emerge, prompting the development of AI‑Infra‑Guard—a lightweight, cross‑platform scanner that identifies over 30 component vulnerabilities and offers both web UI and CLI modes for rapid risk assessment.

AI securityAI-Infra-GuardCVE
0 likes · 13 min read
Detecting Critical AI Infrastructure Vulnerabilities with AI-Infra-Guard
Software Development Quality
Software Development Quality
Jul 10, 2024 · Information Security

How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide

This article outlines a thorough mobile application security testing methodology, covering installation package verification, code obfuscation checks, signature validation, integrity and permission audits, sensitive data handling, keyboard hijacking, account protection, communication encryption, component exposure, and server-side vulnerability assessments such as SQL injection and CSRF.

Mobile Securityapp testingcode obfuscation
0 likes · 11 min read
How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide
FunTester
FunTester
Jun 26, 2024 · Information Security

Mastering Web Application Penetration Testing: Methods, Types, and Best Practices

Web application penetration testing is a systematic security assessment that identifies vulnerabilities such as SQL injection, XSS, CSRF, insecure authentication, and file‑upload flaws, using methods ranging from black‑box to manual testing, and follows best practices like OWASP guidelines to protect data, privacy, and system integrity.

OWASPWeb Securityinformation security
0 likes · 11 min read
Mastering Web Application Penetration Testing: Methods, Types, and Best Practices
Python Programming Learning Circle
Python Programming Learning Circle
Jun 26, 2021 · Information Security

Security Analysis and Exploitation of a QQ Phishing Website

The article documents a step‑by‑step security investigation of a QQ phishing site, detailing its fake login page, POST endpoint, Python‑based credential flooding, network reconnaissance, port scanning, vulnerability scanning, and discovery of the backend control panel, while discussing the challenges of XSS and brute‑force attacks.

Network ScanningWeb Securityinformation security
0 likes · 7 min read
Security Analysis and Exploitation of a QQ Phishing Website
Fulu Network R&D Team
Fulu Network R&D Team
Aug 26, 2020 · Information Security

Establishing a Comprehensive Security Testing Process

This article explains the importance of security testing, outlines where to start, and details a step‑by‑step security testing workflow covering requirement analysis, static code scanning, third‑party component checks, data masking, permission checks, XSS, SQL injection, privilege escalation, file upload/download, server port scanning, and business‑specific test cases.

risk managementsecurity testingsoftware development
0 likes · 9 min read
Establishing a Comprehensive Security Testing Process
360 Quality & Efficiency
360 Quality & Efficiency
May 9, 2016 · Information Security

Comprehensive Guide to Security Testing: Methods, Tools, and Best Practices

This article provides an in‑depth overview of security testing, covering its definition, lifecycle, test types, a wide range of scanning and injection tools, practical checklists, evaluation metrics, and recommendations for integrating security assessments throughout the software development process.

information securitynetwork securitypenetration testing
0 likes · 20 min read
Comprehensive Guide to Security Testing: Methods, Tools, and Best Practices