PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (3)

AWAE/OSWE Preparation and Exam Guide

May 30, 2023
Est Read Time: 9 min
This blog is a personal account from Reando Veshi of preparing for and taking the OSWE (Advanced Web Attacks and Exploitation) exam. Reando shares his experience along with tips that helped him in his journey.
Cobalt Core Compliance Pentester Guides

A Pentester's Guide to Source Code Review

May 15, 2023
Est Read Time: 17 min
This blog post guides how to conduct a source code review project, focusing on advice for those new to the task. The post covers the purpose of a source code review, the process for conducting one, and the information needed to conduct a proper assessment.
Cobalt Core Pentester Guides

Cobalt Core Academy: Thick Client Pentesting with Harsh Bothra

May 5, 2023
Est Read Time: 3 min
Learn about thick client pentests in this Cobalt Core Academy with expert insights from Cobalt Lead, Harsh Bothra.
Cobalt Core Pentester Guides

Mass Assignment & APIs - Exploitation in the Wild

May 1, 2023
Est Read Time: 6 min
APIs have become an integral part of many applications, with REST APIs being a popular choice for implementation. However, this popularity has led to security risks, with OWASP API Top 10 identifying vulnerabilities commonly found in APIs, including mass assignment. Harsh Bothra writes about this in his latest blog.
Cobalt Core Pentester Guides API Pentesting

Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2)

April 24, 2023
Est Read Time: 18 min
Buffer overflow vulnerability happens when data written to a buffer exceeds its size, which may overwrite important data or execute malicious code. Attackers can exploit these vulnerabilities to gain unauthorized access, execute malicious code, or steal sensitive data. This blog will provide an overview of buffer overflow exploitation, including its causes, consequences, and the methods attackers use to exploit it. It's important to understand the basics before diving into exploitation and steps of buffer overflow.
Cobalt Core Pentester Guides

A Pentester’s Guide to Dependency Confusion Attacks

April 17, 2023
Est Read Time: 7 min
This blog post discusses the concept of "Dependency Confusion" in software development, where malicious code is injected into third-party dependencies, such as libraries or frameworks, that applications use.
Cobalt Core Pentester Guides

Overflow Vulnerabilities

April 3, 2023
Est Read Time: 14 min
Overflow vulnerabilities occur when a program or system accepts more data than it can handle, leading to memory corruption and potentially allowing attackers to execute malicious code. Core Pentester Ninad Mathpati writes about these types of vulnerabilities and how to prevent them.
Pentester Guides

A Penetration Tester's Guide To Web Applications

March 29, 2023
Est Read Time: 5 min
Cybersecurity teams constantly need to adapt and protect networks against new vulnerabilities and maintain their...
Pentester Guides Web Application Pentesting

10 Steps to Secure Your Azure Cloud Environment

March 29, 2023
Est Read Time: 11 min
The blog discusses ten essential steps to secure your Azure cloud environment, ranging from access management to network security. It emphasizes the use of Azure CLI to implement these best practices and safeguard against potential security threats. The steps include multifactor authentication, compliance standards, encryption, backups, and disaster recovery plans, among others.
Pentester Guides Cloud Security
    1 2 3 4 5