Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – this video has an audio track.
Month: April 2020
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video…
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes…
Penetesting Industry 4.0 IoT Prototype – 3
Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…
Penetesting Industry 4.0 IoT Prototype – 1
Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure….
Cyber Security Webinar – Working From Home – For Software Developers
Cyber Security Tips – Working From Home For Software Developers Note – Enable sound – this video has an audio track.
Cyber Security Webinar – Working From Home – Securing Workstations
Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.
Cyber Security Webinar – Working From Home – For Sysadmins
Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.
Difference Between Web Based application and Cloud Based Application
This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…