Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

80 Sony IP CCTV Camera Models Are Affected With Two Secret Backdoors       Most of the private and government organizations are using IP-based security camera to keep their eye on sensitive places such as server rooms. According to a report of Austria-based security firm SEC Consult, hackers could compromise IP-based cameras of “Sony” companies because two backdoor accounts are available in their current firmware version. Around 80 models of Sony IP cameras conta

Beware Android Users! Hackers could use “SpyNote” named Trojan to Record Your Calls!   Security Researchers have found “SpyNote” named Trojan on dark web. The Trojan has been leaked its authors in a number of underground forums. Hackers could use this Trojan very soon, to target Android users. This Trojan is capable to record all the “Incoming” and “Outgoing” calls of victim. This is a dangerous Trojan and researchers have no idea, how hac

Facebook Messenger have a Backdoor Vulnerability! Conversations are not safe! Facebook Messenger is an application of Social Media Giant Facebook. More than 950 Million people are using this application for chatting, video calling and voice calling. But a shocking backdoor vulnerability has been found by a Cyber Security firm Check Point’s Security Researcher. The name of that security researcher is Roman Zaikan.   What is the vulnerability? Roman Z

Be Alert Bankers and Traders! TreasureHunt Malware ahead!   It really sounds bad, but it is true. Hackers are using Point of Sale (PoS) category malware to target bankers, marketers, wholesalers and traders. Hackers are using TreasureHunt named malware to gain access of systems used by bankers and traders. After gaining access of systems, hackers are stealing sensitive data of Credit Cards and all the payment cards used by customers. All this information has been provided by the Securit

Beware Skype users! Backdoor “T9000” is spying on you! PaloAlto Networks found a new backdoor, which is targeting famous application “Skype”. The name of the backdoor is T9000 and this backdoor is capable to take screenshots of users system. It can also steal files and can record conversations of skype. According to security experts, this backdoor is look like T5000 backdoor. May be this is a hybrid version of T5000 backdoor which was detected by experts two years ago.

Tips for Android phone users! Android platform has so many weak points. The way with which the apps on android device communicate crucial information with the servers, is one from its biggest weaknesses. Most of the communication methods in android are unencrypted and hackers can exploit this type of vulnerabilities to steal the user’s credentials. There is also an issue with the encryption. Android smart phone could be exposed to hackers by the third-party advertising software. This is

After a huge controversy over Super fish Adware fiasco in Lenovo laptops, another story is in the market. Tom Forbes, an independent researcher, has written blog revealing a backdoor present in "Dell System Detect" software. According to Tom Forbes, Dell System Detect software has a critical flaw that lets an attacker to remotely attack a user by drive by download technique and execute arbitrary file without user consent. This Remote Code Execution vulnerability in Dell System Detect