WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Cobalt Core (4)

Learning iOS App Pentesting and Security Part 1

June 13, 2023
Est Read Time: 5 min
This blog is a three-part series focused on iOS app penetration testing. Swaroop Yermalkar, who is a Core Penetration Tester, shares their experiences and knowledge in various types of pentesting, including mobile app security. The blog aims to provide a comprehensive guide to improving knowledge of iOS security and penetration testing methodologies through real-world case studies.
Cobalt Core Mobile Application Pentesting Vulnerabilities

Pentester Spotlight: Furkan Senan; Computer Enthusiast to Lead Tester

June 1, 2023
Est Read Time: 3 min
From an early age, Furkan Senan was immersed in the world of computers, with a Pentium II CPU and dial-up internet as his constant companion. His insatiable curiosity led him to cybersecurity at the age of 12, where he and his friends explored hacking software. This discovery became a turning point in his life, and he embarked on a journey into the realm of pentesting.
Cobalt Core

AWAE/OSWE Preparation and Exam Guide

May 30, 2023
Est Read Time: 9 min
This blog is a personal account from Reando Veshi of preparing for and taking the OSWE (Advanced Web Attacks and Exploitation) exam. Reando shares his experience along with tips that helped him in his journey.
Cobalt Core Compliance Vulnerabilities

A Pentester's Guide to Source Code Review

May 15, 2023
Est Read Time: 17 min
This blog post guides how to conduct a source code review project, focusing on advice for those new to the task. The post covers the purpose of a source code review, the process for conducting one, and the information needed to conduct a proper assessment.
Cobalt Core Vulnerabilities

SecurityBoat: A Cybersecurity Company Fostering Collaboration and Community Awareness

May 11, 2023
Est Read Time: 3 min
Ninad Mathpati is the founder and CEO of SecurityBoat, a cybersecurity consultancy that offers vulnerability assessments, penetration testing, compliance assistance, and security consultation to help clients identify and mitigate security risks. The company also promotes cybersecurity awareness through its Non-Profit Cybersecurity community group, SB Meetup, offering a platform for knowledge-sharing and networking.
Cobalt Core

Cobalt Core Academy: Thick Client Pentesting with Harsh Bothra

May 5, 2023
Est Read Time: 3 min
Learn about thick client pentests in this Cobalt Core Academy with expert insights from Cobalt Lead, Harsh Bothra.
Cobalt Core Vulnerabilities

Mass Assignment & APIs - Exploitation in the Wild

May 1, 2023
Est Read Time: 6 min
APIs have become an integral part of many applications, with REST APIs being a popular choice for implementation. However, this popularity has led to security risks, with OWASP API Top 10 identifying vulnerabilities commonly found in APIs, including mass assignment. Harsh Bothra writes about this in his latest blog.
Cobalt Core API Pentesting Vulnerabilities

Pentester Spotlight: Rajanish Pathak

April 27, 2023
Est Read Time: 3 min
Rajanish Pathak is a Security Researcher from Goa, India, and a member of the Cobalt Core. His passion for cybersecurity was ignited by his curiosity about how systems work and how they can be breached. Read about Rajanish in his pentester spotlight.
Cobalt Core

Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2)

April 24, 2023
Est Read Time: 18 min
Buffer overflow vulnerability happens when data written to a buffer exceeds its size, which may overwrite important data or execute malicious code. Attackers can exploit these vulnerabilities to gain unauthorized access, execute malicious code, or steal sensitive data. This blog will provide an overview of buffer overflow exploitation, including its causes, consequences, and the methods attackers use to exploit it. It's important to understand the basics before diving into exploitation and steps of buffer overflow.
Cobalt Core Vulnerabilities
    2 3 4 5 6