PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Harsh Bothra

Harsh Bothra is a Security Engineer with expertise in Web application, API, Android Application, Thick Client, and Network Pentesting. He has over 5 years of experience in Cybersecurity and penetration testing. He has written multiple books on ethical hacking including Mastering Hacking and Hacking: Be a Hacker with Ethics, presented at various security conferences, and is an active bug bounty hunter.

Hunting for Broken Link Hijacking (BLH)

December 7, 2022
Est Read Time: 4 min
How often are you checking to ensure there are no broken links on your webpage? If you aren't checking, attackers could be taking advantage using a broken link hijacking attack. Core Pentester Harsh Bothra writes about what scenarios to watch out for.
Cobalt Core Pentester Guides

Introduction to Serverless Vulnerabilities

November 23, 2022
Est Read Time: 6 min
Core Pentester Harsh Bothra introduces us to serverless vulnerabilities. He reviews the top 10 vulnerabilities and concludes with how to remediate them.
Cobalt Core Pentester Guides

Web Socket Vulnerabilites

September 27, 2022
Est Read Time: 9 min
WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Cobalt Core Pentester Guides Web Application Pentesting

Secure Software Best Practices: Protect Against Server-Side Request Forgery

September 26, 2022
Est Read Time: 7 min
See examples of Server-Side Request Forgery (SSRF) exploitation, and learn how to minimize your risks.
Pentester Guides

Graph Query Language Explained

August 18, 2022
Est Read Time: 9 min
Cobalt Core Pentester Harsh Bothra explains Graph Query Language and how attackers use it. Read his guide to learn how attackers think and take advantage.
Cobalt Core Pentester Guides API Pentesting

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Pentester Guides

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Pentester Guides

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Pentester Guides