NI logo
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Vulnerability Assessments

SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors

January 22, 2021 Syed Sajjad Mehdi 0

Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as a specific customer. This means [more]

SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors

December 31, 2020 Syed Sajjad Mehdi 0

You can read Part 1 here.   It may be possible that multiple SAP servers could run across different systems. Identify all the servers before proceeding with the assessment. This [more]

SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

December 11, 2020 Syed Sajjad Mehdi 2

SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage their businesses to manage financial, asset, and cost [more]

Security Assessment of the IBM i (AS 400) System

August 9, 2020 Shashank Gosavi 1

A few months back, I was asked to perform a security assessment of the core banking setup for a bank. The core banking application was hosted on the IBM AS/400 [more]

No Image

PCI DSS Compliance Calendar – Activities and Checklist

March 7, 2016 Udit Pathak 0

Compliance to the PCI DSS standard is mandatory for all entities which store, process or transmit card-holder data associated with Visa, Mastercard, American Express, Discover and JCB. As part of this [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 132 other subscribers

Top Posts

  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
    SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
    The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
    SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
  • SSL Pinning: Introduction & Bypass for Android
    SSL Pinning: Introduction & Bypass for Android
  • Consumer Protection Regulation
    Consumer Protection Regulation
  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?
  • Look who’s watching
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Categories

  • Android Forensics
  • Anti-Forensics
  • Assessment
  • Case Studies
  • Compliance
  • Compromise Detection
  • Cyber security career
  • Data Privacy
  • Database Monitoring
  • DFIR
  • Digital Forensics
  • Disk Forensics
  • Fundamentals
  • Hacks
  • Incident Response
  • Interview
  • Laws & Regulations
  • Malware Analysis
  • Mobile
  • Network Forensics
  • Opinion
  • Penetration Testing
  • Phishing
  • Reading
  • Red Team
  • Research
  • Secure Coding
  • Security Measures
  • Security Review
  • Security Testing
  • SOC
  • Social Engineering
  • Sql Injection
  • Survey
  • Telecom Security
  • Threat Advisory
  • Tools
  • Uncategorized
  • Web Application Security
  • Wireless Security

Recent Posts

  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?

Recent Comments

  • Pankaj Lad on Business Impact Analysis – Getting it Right
  • gmd on Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)

Copyright © 2023 | WordPress Theme by MH Themes