PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (8)

Parameter Tampering Vulnerability Using 3 Different Approaches

June 21, 2021
Est Read Time: 4 min
With the growing number of online transactions increasing, it is clear that payment security is crucial. I have created...
Pentester Guides

Getting Started with Android Application Security

June 7, 2021
Est Read Time: 13 min
Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Pentester Guides Mobile Application Pentesting

Pentester Diaries Ep5: Understanding Severity Ratings

June 2, 2021
Est Read Time: 12 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Pentester Guides

How to Write an Effective Pentest Report: Vulnerability Reports

May 17, 2021
Est Read Time: 9 min
The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
Pentester Guides

Pentester Diaries Ep4: Beyond Security Hygiene

May 12, 2021
Est Read Time: 15 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Pentester Guides

Anatomy of the Session Management Tests

March 19, 2021
Est Read Time: 6 min
Note: This article has been created in light of the OWASP standards and descriptions.
Cobalt Core Pentester Guides

Pentester Diaries Ep1: Understanding Business Logic

March 11, 2021
Est Read Time: 22 min
We are excited to share the first episode of a new podcast series, Pentester Diaries.
Pentester Guides

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

March 2, 2021
Est Read Time: 6 min
Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Pentester Guides

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Pentester Guides