Try Now
Get hands on with Cobalt's PtaaS Platform

Pentester Guides

Azure AD: Pentesting Fundamentals

Core member Orhan Yildirim walks us through how to use Azure AD when pentesting.
May 23, 2022
Est Read Time: 1 min

From CSRF and File Upload to RCE - JAVA

I have come across many interesting vulnerabilities throughout my offensive security career. In this post, I would like...
Sep 16, 2021
Est Read Time: 1 min

iOS Pentesting 101

It is no secret that mobile devices are on the rise. According to the first-quarter 2021 Nielsen Total Audience Report...
Aug 20, 2021
Est Read Time: 1 min

Pentester Diaries Ep7: Tips for Communicating with Customers

Welcome back to Pentester Diaries. In this episode, Cobalt’s Grahame Turner interviews Core pentester Stefan Nicula on...
Aug 12, 2021
Est Read Time: 1 min

Pentester Diaries Ep6: The Importance of Report Writing

Welcome back to Pentester Diaries. In this episode, longtime Core member and Cobalt Research Manager, Robert Kugler...
Jun 24, 2021
Est Read Time: 1 min

Parameter Tampering Vulnerability Using 3 Different Approaches

With the growing number of online transactions increasing, it is clear that payment security is crucial. I have created...
Jun 21, 2021
Est Read Time: 1 min

Getting Started with Android Application Security

Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Jun 7, 2021
Est Read Time: 1 min

Pentester Diaries Ep5: Understanding Severity Ratings

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Jun 2, 2021
Est Read Time: 1 min

How to Write an Effective Pentest Report: Vulnerability Reports

The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
May 17, 2021
Est Read Time: 1 min
    1 2 3 4 5