Skip to main content


Showing posts from September, 2015

Automating security Scans:Part-1

Running daily scans manually is a very cumbersome and boring task. So I thought of automating them for ease and fast processing. So Zaproxy is very well known OWASP vulnerability scanner that can be very helpful for webapps pentesting and lot more. So here are few steps to get started with OWASP Zaproxy: Step1: Download ZAProxy from here Step2: You can run Zaproxy in GUI mode to get feel and things that are available on this beautiful scanner. But in order to automated I prefer it running in daemon mode. So I use follwoing command: ./ -daemon -config api.disablekey=true & So this command will start ZAP in daemon mode with ZAP APIs listening  on 8080  by default. Oh I forget to tell you that this scanner comes with REST API which you can access using python, java or ruby also. Everything that you can do from gui is also supported by these APIs. I generally use python so I installed owasp-zapv2 using pip. pip install python-owasp-zap-v2.4 If you want to read more ab

Resize AVD: Android Emulator

The emulator file system is ext4. You can re-size the userdata.img using standard Linux tools. Try this only when you are facing problem increasing AVD size using Android-SDK GUI. # Navigate to AVD cd ~ /.android/ avd /{name-of-avd} # Delete old image rm userdata - qemu .* # Re-size the image resize2fs userdata . img 1 512M # Start the emulator and enjoy#BePatient it may take some time to create new partition emulator {name-of-avd} OR e2fsck - f userdata - qemu . img resize2fs userdata - qemu . img 512M