PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (5)

A Dive into Client-Side Desync Attacks

January 16, 2023
Est Read Time: 7 min
A client-side desync, a.k.a CSD, is an attack in which the victim's web browser is tricked into desynchronizing its connection to the vulnerable website. Core Pentester Harsh Bothra takes a look at how attackers can find these vulnerabilities in the wild.
Cobalt Core Pentester Guides

Deep Dive into GraphQL Pt. 2

January 9, 2023
Est Read Time: 8 min
Welcome to part two of GraphQL! Core Pentester Michael Adcock tackles our newest deep dive into the open-source data query.
Pentester Guides API Pentesting

A Pentester’s Guide to Prototype Pollution Attacks

January 2, 2023
Est Read Time: 8 min
Core Pentester Harsh Bothra guides us through prototype pollution attacks in his latest blog. This covers a security vulnerability that allows attackers to exploit JavaScript runtimes.
Cobalt Core Pentester Guides

All you need to know about JWT Pt. 2

December 26, 2022
Est Read Time: 13 min
Did you read our introductory blog on JSON tokens in November? Now time for a deeper dive into JSON Web Tokens, aka JWT. Core Pentester Ninad Mathpati expands on all things JWT.
Cobalt Core Pentester Guides

Steampipe: Monitor Your Cloud Resources

December 21, 2022
Est Read Time: 8 min
Are you working in the cloud? If so, you can use an open-source tool named Steampipe to monitor your cloud infrastructure using SQL. One of Cobalt's Core Pentesters walks us through how Steampipe works in our latest Pentester Guide.
Cobalt Core Pentester Guides

Introduction to Command Injection Vulnerability

December 14, 2022
Est Read Time: 8 min
We've covered code injection attacks in recent blogs, but do you happen to know about command injection attacks? Core Pentester Harsh Bothra walks us through the differences and covers all you need to know to protect yourself against command injection attacks.
Cobalt Core Pentester Guides

Hunting for Broken Link Hijacking (BLH)

December 7, 2022
Est Read Time: 4 min
How often are you checking to ensure there are no broken links on your webpage? If you aren't checking, attackers could be taking advantage using a broken link hijacking attack. Core Pentester Harsh Bothra writes about what scenarios to watch out for.
Cobalt Core Pentester Guides

Introduction to Serverless Vulnerabilities

November 23, 2022
Est Read Time: 6 min
Core Pentester Harsh Bothra introduces us to serverless vulnerabilities. He reviews the top 10 vulnerabilities and concludes with how to remediate them.
Cobalt Core Pentester Guides

Red Teaming vs. Pentesting

November 21, 2022
Est Read Time: 2 min
Core Pentester Saad Nasir writes about what the difference between red teaming and pentesting is based on his own experiences. Saad is a Pentester in Cobalt's Core and on the Red Team at SolarWinds.
Cobalt Core Pentester Guides
    3 4 5 6 7