PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (10)

A Pentester’s Guide to HTTP Request Smuggling

October 15, 2020
Est Read Time: 9 min
What is HTTP Request Smuggling? HTTP request smuggling is an attack technique that is conducted by interfering with the...
Pentester Guides

Pentest Workflow — Leveraging Community-Powered Tools

April 14, 2020
Est Read Time: 3 min
As a pentester, I like to look for ways to leverage automation so I can focus my efforts on bugs that are hard to...
Pentester Guides

Anatomy of Authentication Tests

March 5, 2020
Est Read Time: 4 min
Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Pentester Guides

The Anatomy of Deserialization Attacks

January 23, 2020
Est Read Time: 7 min
What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Pentester Guides

Understanding the Anatomy of an Attack

November 21, 2019
Est Read Time: 9 min
Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Pentester Guides

How to Scope a Network Penetration Test: Tips from an Expert Pentester

October 3, 2019
Est Read Time: 4 min
During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Pentester Guides

Is Your Serverless App Secure?

August 6, 2019
Est Read Time: 4 min
In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Pentester Guides

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

April 9, 2019
Est Read Time: 2 min
I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Cobalt Core Pentester Guides

From SSRF to Port Scanner

March 18, 2019
Est Read Time: 4 min
How to convert a SSRF vulnerability into a Port Scanner
Pentester Guides