PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (2)

Think Like an Attacker: Using OSINT to Safeguard Your Organization

October 4, 2024
Est Read Time: 5 min
In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
Pentester Guides

Pentester Guide: Weak or Default Credentials

September 24, 2024
Est Read Time: 4 min
Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Pentester Guides

What is an Attack Vector? Defending against 23 Common Attack Vectors

September 9, 2024
Est Read Time: 14 min
Attack vector management forms the foundation for effective cybersecurity. Understanding the attack vectors that...
Pentester Guides

10 Questions with Aditya Raj Singh: Pentester Spotlight

September 5, 2024
Est Read Time: 4 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Pentester Stories Pentester Guides

Testing for Reflective XSS

June 24, 2024
Est Read Time: 16 min
Reflected XSS, also known as Reflected Cross-Site Scripting, is a dangerous vulnerability that occurs when a web...
Pentester Guides

Browser Security: Same Origin Policy vs CORS, Misconfigurations

June 11, 2024
Est Read Time: 12 min
This blog guides how to understand and evaluate CORS (Cross-Origin Resource Sharing) misconfigurations. As pentesters,...
Pentester Guides

LLMNR Poisoning, NTLM Relay and More

January 31, 2024
Est Read Time: 14 min
In this article we’ll touch on what are the hash types used in Windows systems, what is the LLMNR protocol, how it...
Pentester Guides

iOS App Pentesting and Security with Real-World Case Studies Part 2

June 26, 2023
Est Read Time: 3 min
In part 2 of our IOS pentesting series, we will explore two additional case studies. One of them is about a ride-sharing app, and the other is about an E-commerce app. These case studies highlight the risks associated with insecure practices in iOS app development, such as hardcoding credentials and the exploitation of third-party libraries, emphasizing the importance of secure coding, data storage, and access control measures.
Cobalt Core Pentester Guides Mobile Application Pentesting

Learning iOS App Pentesting and Security Part 1

June 13, 2023
Est Read Time: 5 min
This blog is a three-part series focused on iOS app penetration testing. Swaroop Yermalkar, who is a Core Penetration Tester, shares their experiences and knowledge in various types of pentesting, including mobile app security. The blog aims to provide a comprehensive guide to improving knowledge of iOS security and penetration testing methodologies through real-world case studies.
Cobalt Core Pentester Guides Mobile Application Pentesting
    1 2 3 4 5