Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

[caption id="attachment_614" align="aligncenter" width="550"] Hack Facebook account[/caption] A critical vulnerability is found in REST API which allows you to hack Facebook account and exploit it. Stephan Sclafani a famous security researcher has found this bug and reported it to Facebook. The bug allows you to make calls, access private messages, view email address, update the status, post link to anyone's timeline. You can create photo albums, upload any photo, share it with different grou

[caption id="attachment_619" align="aligncenter" width="500"] Hack android device[/caption] The most popularly used mobile operating system Android by Google is now having a serious vulnerability. Android vulnerability is found by a security firm Curesec in the Apps. What is Android vulnerability? Android vulnerability found is in its apps. Some of the latest and commonly used android apps available on app store now can make automatic phone calls to random numbers. This is because the Andro

[caption id="attachment_613" align="aligncenter" width="620"] Hack facebook account in just 5 minutes[/caption] One of the most popular social networking website Facebook was today stunned when a security researcher found vulnerability in Facebook. You can now hack Facebook account in just 5 minutes. Check out how this can be done. Also SEE: Israeli Army Twitter account hacked How to hack Facebook account in just 5 minutes? Generally when we login into web apps o

[caption id="attachment_572" align="aligncenter" width="609"] Syrian electronic army hacked Israeli twitter account[/caption] One of the famous hacking group Syrian Electronic army today hacked the Israeli Army Twitter account. The hackers posted a tweet saying, Nuclear facility in Israeli have been hit by 2 rockets. As soon as the message was released it created a sense of panic among the people of Israeli. Also SEE: Domino's website hacked Israeli Army twitt

[caption id="attachment_562" align="aligncenter" width="550"] wysija MailPoet Wordpress Plugin[/caption] A famous security firm Sucuri has found a bug in the MailPoet WordPress plugin which has made more than 1,700,00 websites vulnerable to cyber attacks. Marc-Alexandre Montpas a researcher from the website security firm Sucuri has found this flaw few weeks ago and sent it to the MailPoet WordPress plugin developers. How to hack WordPress website using MailPoet? M

[caption id="attachment_515" align="aligncenter" width="650"] Facebook users news feed experiment[/caption] Popular media giant Facebook is now showing its own monotony over its website. Facebook manipulated with users feed in secret experiment and checked what type of response does the users give to different comments.What was the experiment made by Facebook?Facebook officially revealed that it made an experiment on 689,003 users. The experiment was performed to study the human behavior through

[caption id="attachment_508" align="aligncenter" width="484"] removed by google[/caption] Pirate Bay's most famous file hosting service provider is removed by Google. Now you need to directly open the website in the URL bar. If you would try to search on Google you would get zero search results.Also SEE: DNS sinkholes the best weapon to protect your website. What is is one of the m

[caption id="attachment_435" align="aligncenter" width="380"] DNS Sinkhole prevent against malware attack[/caption] In today's era, where the malware attacks are increasing day by day DNS sinkhole is the best way to protect your website from it. DNS sinkholes are also known as sinkhole server, internet sinkhole or blackholeDNS. What actually does this DNS sinkhole do? In simple words, DNS sinkholes sends false information to the servers so as to prevent the un

[caption id="attachment_408" align="aligncenter" width="579"] Stuxnet worm affecting the Iran nuclear programme[/caption] A very famous malware Stuxnet which was designed to attack the industrial logical controllers. A similar malware named Havex Malware is designed for the cyber attacks on the organisations associated with the energy sector. What is Stuxnet Malware? Back in 2010, Stuxnet worm was designed to destroy the Iranian nuclear project. Stxunet has three

[caption id="attachment_354" align="aligncenter" width="360"] Google launches new gmail api[/caption] After the success of the Gmail IMAP and POP, Google launched a new Gmail API for the app developers. The new GMAIL API launched would give an easy access to data for those who want to build GMAIL integrated apps. The question is that how this new GMAIL API launched would change the experience of using GMAIL. Also see: Evernote Forum hacked What is GMAIL IMAP and POP? Before the new GMAIL A

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.