Demo
Discover how Cobalt's PtaaS platform can benefit your business.

Pentester Guides (6)

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A pentester has a fixed amount of time, typically two...
Oct 3, 2019
Est Read Time: 4 min

A Pentester’s Favorite Vulnerability Scanning Tools

It’s important to note that a vulnerability scan is not a pentest. Automation isn’t a bad thing, it’s actually...
Sep 27, 2019
Est Read Time: 3 min

Is Your Serverless App Secure?

In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Aug 6, 2019
Est Read Time: 4 min

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Apr 9, 2019
Est Read Time: 2 min

From SSRF to Port Scanner

How to convert a SSRF vulnerability into a Port Scanner
Mar 18, 2019
Est Read Time: 4 min

.git — The Hidden Danger

Git is great versioning system that I am actively using while doing some development.
Dec 4, 2017
Est Read Time: 2 min

Kerberoast Attack Techniques

In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique).
Nov 1, 2017
Est Read Time: 5 min
    3 4 5 6 7