Try Now
Get hands on with Cobalt's PtaaS Platform

Pentester Guides

Attacking Windows Applications Pt. 2

Welcome to the second part of the blog series "Attacking windows application." In this blog, we go more in-depth on attacking these applications and the tools used.
Aug 4, 2022
Est Read Time: 8 min

Azure AD: Pentesting Fundamentals

Core member Orhan Yildirim walks us through how to use Azure AD when pentesting.
May 23, 2022
Est Read Time: 9 min

From CSRF and File Upload to RCE - JAVA

I have come across many interesting vulnerabilities throughout my offensive security career. In this post, I would like...
Sep 16, 2021
Est Read Time: 6 min

iOS Pentesting 101

It is no secret that mobile devices are on the rise. According to the first-quarter 2021 Nielsen Total Audience Report...
Aug 20, 2021
Est Read Time: 15 min

Pentester Diaries Ep7: Tips for Communicating with Customers

Welcome back to Pentester Diaries. In this episode, Cobalt’s Grahame Turner interviews Core pentester Stefan Nicula on...
Aug 12, 2021
Est Read Time: 15 min

Pentester Diaries Ep6: The Importance of Report Writing

Welcome back to Pentester Diaries. In this episode, longtime Core member and Cobalt Research Manager, Robert Kugler...
Jun 24, 2021
Est Read Time: 18 min

Parameter Tampering Vulnerability Using 3 Different Approaches

With the growing number of online transactions increasing, it is clear that payment security is crucial. I have created...
Jun 21, 2021
Est Read Time: 4 min

Getting Started with Android Application Security

Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Jun 7, 2021
Est Read Time: 13 min

Pentester Diaries Ep5: Understanding Severity Ratings

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Jun 2, 2021
Est Read Time: 12 min
    1 2 3 4 5