Event
Join cybersecurity experts from Slack, Riot Games, EY and more at our upcoming roadshow. 

Cobalt Core (2)

A Pentester’s Guide to File Inclusion

Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Feb 19, 2021
Est Read Time: 4 min

A Pentester’s Guide to Code Injection

Learn about code injection vulnerabilities with the Pentester’s Guide to Code Injection.
Jan 8, 2021
Est Read Time: 4 min

A Pentester's Guide to Server Side Template Injection (SSTI)

Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side.
Dec 24, 2020
Est Read Time: 3 min

A Pentester’s Guide to Server Side Request Forgery (SSRF)

What is SSRF? In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to...
Oct 1, 2020
Est Read Time: 3 min

A Pentester’s Guide to SQL Injection (SQLi)

This blog will be one of many created alongside our Hacking How-To series, an educational video series around everyday...
Sep 17, 2020
Est Read Time: 5 min

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Apr 9, 2019
Est Read Time: 4 min

.git — The Hidden Danger

Git is great versioning system that I am actively using while doing some development.
Dec 4, 2017
Est Read Time: 2 min
    1 2 3