If you missed the PtaaS Exchange in person, join us virtually to learn how to improve your security program in 2023.

Pentester Guides (5)

How to Write an Effective Pentest Report: Vulnerability Reports

The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
May 17, 2021
Est Read Time: 9 min

Pentester Diaries Ep4: Beyond Security Hygiene

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
May 12, 2021
Est Read Time: 15 min

Anatomy of the Session Management Tests

Note: This article has been created in light of the OWASP standards and descriptions.
Mar 19, 2021
Est Read Time: 6 min

Pentester Diaries Ep1: Understanding Business Logic

We are excited to share the first episode of a new podcast series, Pentester Diaries.
Mar 11, 2021
Est Read Time: 22 min

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Mar 2, 2021
Est Read Time: 6 min

A Pentester’s Guide to File Inclusion

Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Feb 19, 2021
Est Read Time: 4 min

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Feb 16, 2021
Est Read Time: 10 min

A Pentester’s Guide to WebSocket Pentesting

What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Feb 5, 2021
Est Read Time: 4 min

Bypassing the Protections — MFA Bypass Techniques for the Win

Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Jan 27, 2021
Est Read Time: 6 min
    3 4 5 6 7