Public about IT. security news and technical.
*brute force passwords in auth forms
*diretory disclosure ( use PATH list to brute, and find HTTP status code )
*test list on input to find SQL Injection and XSS vulnerabilities
Visit this source to know more about keyloggers for android.
Post a Comment