Skip to content
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Quick Links
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • 0752607204
  • info@ctdefense.com
  • Str. Fagului, nr. 83

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Category: Tutorials

  • Home
  • Tutorials

Tips to protect your mobile devices

September 24, 2021September 24, 2021 David Timofte

Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More

Security Management, TutorialsLeave a comment

How to secure web and mobile applications

July 29, 2021July 29, 2021 David Timofte

How to secure web and mobile applications Security online is crucial, and we all can imagine why. Hacks and breaches could have a huge negative impact on companies: Loss of customer trust; Financial losses; Leaked user data; Legal issues. You… Read More

Tutorialscybersecurity, pentest, sourcecode reviewLeave a comment

How to keep your identity and your personal financial information safe in 2021

July 2, 2021July 2, 2021 David Timofte

How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More

Security Management, TutorialsLeave a comment

How to Bypass RootBeer’s Root Detection

June 16, 2021June 16, 2021 Veronica Mihaiu

How to Bypass RootBeer’s Root Detection During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device. The most common library that… Read More

TutorialsLeave a comment
how to expend your attack surface

How to expand your attack surface

June 5, 2019July 16, 2019 Razvan Furdui

with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When… Read More

Tools review, Tutorialsattack, attack surface, Care to be Cyber Aware, CTDefense, cyber security, Cyber Threat Defense, cyber tutorials, domain, web server2 Comments
CA and SSL pinning protections

CA and Bypass SSL pinning protection on Android

May 5, 2019August 23, 2019 Razvan Furdui

Adding CA to an Android system and bypass SSL pinning protections are two very important steps in testing the security of different applications. After my latest article – How To Install And Root Your Android Emulator – I received a… Read More

Tutorialscyber security, CyberThreatDefense, emulator, ethical hacking, hacking techniques, security, SSL pinningLeave a comment
install-root-android-emulator

How to install and root your Android emulator

April 22, 2019June 5, 2019 Razvan Furdui

Mobile applications became an essential part of our lives, somehow we are dependent of them. We are using a lot of mobile applications every day. If you are lost in a new city, Google Maps gets you out of this… Read More

TutorialsAndroid, cyber security, CyberThreatDefense, emulator, how to, how to install, how to root, install, mobile aplications, Razvan Furdui, root2 Comments

Recent Posts

  • Misleading HTTP Status codes and how I got my first CVEs
  • How to protect your systems against recent Threat Actor’s activity?
  • The role of Cyber Ops in a shooting war
  • How to get started in Cyber Security?
  • Women in CyberSecurity

Archives

  • November 2022
  • August 2022
  • July 2022
  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • March 2021
  • April 2020
  • February 2020
  • June 2019
  • May 2019
  • April 2019

Categories

  • Our team
  • Security Management
  • Security research
  • Tools review
  • Tutorials
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Menu

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Recent Posts

  • Misleading HTTP Status codes and how I got my first CVEs
  • How to protect your systems against recent Threat Actor’s activity?
  • The role of Cyber Ops in a shooting war
  • How to get started in Cyber Security?
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Copyright © CT Defense All rights reserved.
Corporate Club by Axle Themes