PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Cobalt Core (3)

Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2)

April 24, 2023
Est Read Time: 18 min
Buffer overflow vulnerability happens when data written to a buffer exceeds its size, which may overwrite important data or execute malicious code. Attackers can exploit these vulnerabilities to gain unauthorized access, execute malicious code, or steal sensitive data. This blog will provide an overview of buffer overflow exploitation, including its causes, consequences, and the methods attackers use to exploit it. It's important to understand the basics before diving into exploitation and steps of buffer overflow.
Cobalt Core Pentester Guides

Hacker Corner Episode 2: Managing a Community of 400+ Hackers

April 19, 2023
Est Read Time: 3 min
On this episode of Hacker Corner, host Sheeraz Ali sits down with Community Manager Elizabeth Ramirez to talk about managing a community of 400+ hackers.
Cobalt Core

A Pentester’s Guide to Dependency Confusion Attacks

April 17, 2023
Est Read Time: 7 min
This blog post discusses the concept of "Dependency Confusion" in software development, where malicious code is injected into third-party dependencies, such as libraries or frameworks, that applications use.
Cobalt Core Pentester Guides

Pentester of the Quarter: Shubham Chaskar

April 10, 2023
Est Read Time: 1 min
Cobalt is excited to announce that Shubham Chaskar is the Q2 Pentester of the Quarter!
Cobalt Core

Dynamic Duo: Dhiraj Mishra & Zubin Devnani

April 5, 2023
Est Read Time: 2 min
Dhiraj Mishra and Zubin Devnani, two Core Pentesters, have led ten successful fuzzing workshops together and have plans to continue. Read about how they got started in our blog about the Dynamic Duo in the Core.
Pentester Stories Cobalt Core

Pentester Spotlight: Herane Malhotra

March 26, 2023
Est Read Time: 2 min
This month's Pentester Spotlight features Herane Malhotra, a Core Pentester since 2021 and Lead.
Pentester Stories Cobalt Core

OAuth Vulnerabilites Pt. 2

March 20, 2023
Est Read Time: 10 min
OAuth is a widely-used protocol that enables users to authorize third-party applications to access their data from other services, such as social media or cloud storage. However, like any technology, OAuth is not immune to vulnerabilities. This is Pt. 2 of a two-part series by Core Pentester Shubham Chaskar.
Cobalt Core Pentester Guides

Active Directory Series: Active Directory Fundamentals

March 13, 2023
Est Read Time: 12 min
Active Directory is a Microsoft service that provides centralized management of user accounts, devices, and access to resources in a networked environment. It allows IT professionals to create and manage users, groups, computers, and other resources on a network, and control access to those resources based on policies and permissions.
Cobalt Core Pentester Guides

Pentester’s Guide to XPATH Injection

February 27, 2023
Est Read Time: 6 min
XPath is a powerful language used to query and manipulate XML documents. It allows you to extract data, transform XML documents, query large datasets, and modify the structure and content of XML documents. XPath injection attacks occur when an attacker manipulates XPath statements to gain unauthorized access to sensitive data.
Cobalt Core Pentester Guides
    1 2 3 4 5