PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (6)

PTaaS Roadshow Recap: Into the Hacker’s Mind

November 18, 2022
Est Read Time: 5 min
Cobalt Core members Vanessa Sauter, Derek Carlin, and Andreea Cristina Druga share insights on how to prepare for a pentest, what tools they use to stress test your assets, and the steps they take to check what vulnerabilities you’re susceptible to.
Cybersecurity Insights Pentester Guides

Common Vulnerabilities in NodeJS Applications

November 18, 2022
Est Read Time: 7 min
Node.js is an open-source and cross-platform JavaScript runtime environment. Today we are going to look at 3 different vulnerabilities by analyzing the source code of an application and how you can detect and exploit them. 
Cobalt Core Pentester Guides

Source Code Review

November 9, 2022
Est Read Time: 11 min
Are you checking your new products for vulnerabilities in all capacities? Ninad Mathpati shares what you need to be doing during your Source Code Review and what attackers look for.
Cobalt Core Pentester Guides

The Guide to Understanding Content Security Policy (CSP) and Bypass Exploits

October 12, 2022
Est Read Time: 9 min
This blog post aims to demonstrate what CSP is and why CSP is implemented. And how attackers can bypass CSP. In this article, I will include how you can bypass some directives to achieve XSS on the target application.
Cobalt Core Pentester Guides

Web Socket Vulnerabilites

September 27, 2022
Est Read Time: 9 min
WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Cobalt Core Pentester Guides Web Application Pentesting

Secure Software Best Practices: Protect Against Server-Side Request Forgery

September 26, 2022
Est Read Time: 7 min
See examples of Server-Side Request Forgery (SSRF) exploitation, and learn how to minimize your risks.
Pentester Guides

Secure Software Best Practices: Validate User Input

September 23, 2022
Est Read Time: 6 min
Protect your systems from bad user input. In this article, we share best practices to validate user input, securely.
Pentester Guides

Secure Software Best Practices: Prevent Security Misconfigurations

September 21, 2022
Est Read Time: 4 min
Configure your software properly to avoid security issues.
Pentester Guides

Is your wifi connection secure? How attackers take advantage of public WIFI

September 6, 2022
Est Read Time: 6 min
Do you connect to public wifi networks when you are out? You might be putting yourself and your data at risk. Core Pentester Orhan Yildirim shares how attackers take advantage of these public networks.
Cobalt Core Pentester Guides
    4 5 6 7 8