PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Pentester Guides (9)

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Pentester Guides

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Pentester Guides Web Application Pentesting

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Pentester Guides

A Pentester’s Guide to Code Injection

January 8, 2021
Est Read Time: 3 min
Learn about code injection vulnerabilities with the Pentester’s Guide to Code Injection.
Cobalt Core Pentester Guides

A Pentester's Guide to Server Side Template Injection (SSTI)

December 24, 2020
Est Read Time: 3 min
Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side.
Cobalt Core Pentester Guides

A Pentester’s Guide to Command Injection

December 11, 2020
Est Read Time: 3 min
Get expert insights with a command injection tutorial with insights from pentesting experts at Cobalt, a Pentest as a Service (PtaaS) provider.
Pentester Guides

How to Execute an XML External Entity Injection (XXE)

November 26, 2020
Est Read Time: 4 min
What's XXE? An XML External Entity vulnerability is a type of attack against an application that parses XML input. This...
Pentester Guides

A Pentester’s Guide to Cross-Site Request Forgery (CSRF)

November 13, 2020
Est Read Time: 4 min
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application...
Pentester Guides

A Pentester’s Guide to Cross-Site Scripting (XSS)

October 30, 2020
Est Read Time: 8 min
Examine a common security vulnerability, Cross-Site Scripting (XSS).
Pentester Guides