WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Cobalt Core (6)

Active Directory Series: Active Directory Fundamentals

March 13, 2023
Est Read Time: 12 min
Active Directory is a Microsoft service that provides centralized management of user accounts, devices, and access to resources in a networked environment. It allows IT professionals to create and manage users, groups, computers, and other resources on a network, and control access to those resources based on policies and permissions.
Cobalt Core Vulnerabilities

Pentester’s Guide to XPATH Injection

February 27, 2023
Est Read Time: 6 min
XPath is a powerful language used to query and manipulate XML documents. It allows you to extract data, transform XML documents, query large datasets, and modify the structure and content of XML documents. XPath injection attacks occur when an attacker manipulates XPath statements to gain unauthorized access to sensitive data.
Cobalt Core Vulnerabilities

Pentester Spotlight: Goonjeta Malhotra

February 23, 2023
Est Read Time: 2 min
“Pentesting allowed me to challenge my skills and knowledge, to think of creative ways to exploit and identify vulnerabilities, and always to find ways to improve security posture." That's what Core Pentester Goonjeta Malhotra said about her journey into pentesting. Learn more about Goonjeta in here Pentester Spotlight.
Cobalt Core

Introduction to Chrome Browser Extension Security Testing

February 20, 2023
Est Read Time: 13 min
Browser extensions are software components that enhance the functionality of existing programs, specifically web browsers by modifying the user interface and interaction with websites, allowing users to customize their browsing experience. However, they also pose a security risk as they interact directly with untrusted web content and have vulnerabilities that malicious website operators and network attackers can exploit. This blog highlights the importance of Chrome browser extension security, permissions, testing for vulnerabilities, real-time attack scenarios, and mitigation methods.
Cobalt Core Vulnerabilities

Getting Started in Pentesting

February 16, 2023
Est Read Time: 4 min
Interested in pentesting but don't know where to start? Our Core Pentesters have you covered. Read to hear their tips and advice on how to get started.
Cobalt Core

Introduction to LDAP Injection Attack

February 13, 2023
Est Read Time: 7 min
LDAP (Lightweight Directory Access Protocol) is a protocol for accessing and managing directory services over a network. LDAP injection is a type of attack that targets vulnerabilities in implementations of the LDAP. Core Pentester Harsh Bothra shows us how an attacker does this injection and how to protect against it.
Cobalt Core Vulnerabilities

Cybersecurity Certifications, how much do they really matter?

February 1, 2023
Est Read Time: 5 min
Cybersecurity certifications can benefit individuals with 1-4 years of experience when looking for new job opportunities. Certifications alone don't necessarily make someone a good pentester and should be considered in conjunction with professional experience.
Cobalt Core

Hacking Web Cache - Deep Dive in Web Cache Poisoning Attacks

January 31, 2023
Est Read Time: 9 min
Web cache poisoning is an attack where an attacker takes advantage of flaws in the caching mechanism. They attempt to store an altered and malicious response in the cache entry, forcing the website to serve malicious information to its users.  Core Pentester Harsh Bothra deep dives into these attacks and remediations.
Cobalt Core Web Application Pentesting Vulnerabilities

Then & Now: Harsh Bothra

January 19, 2023
Est Read Time: 3 min
Core Pentester Harsh Bothra joined Cobalt a little over two years ago. Since then, he has become a Pentest Lead and worked on endless engagements. He takes this time to reflect on how things have changed since his first test.
Cobalt Core
    4 5 6 7 8