WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Vulnerabilities (10)

A Pentester’s Guide to Cross-Site Scripting (XSS)

October 30, 2020
Est Read Time: 8 min
Examine a common security vulnerability, Cross-Site Scripting (XSS).
Vulnerabilities

A Pentester’s Guide to HTTP Request Smuggling

October 15, 2020
Est Read Time: 9 min
What is HTTP Request Smuggling? HTTP request smuggling is an attack technique that is conducted by interfering with the...
Vulnerabilities

Pentest Workflow — Leveraging Community-Powered Tools

April 14, 2020
Est Read Time: 3 min
As a pentester, I like to look for ways to leverage automation so I can focus my efforts on bugs that are hard to...
Vulnerabilities

Anatomy of Authentication Tests

March 5, 2020
Est Read Time: 4 min
Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Vulnerabilities

The Anatomy of Deserialization Attacks

January 23, 2020
Est Read Time: 7 min
What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Vulnerabilities

Understanding the Anatomy of an Attack

November 21, 2019
Est Read Time: 9 min
Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Vulnerabilities

How to Scope a Network Penetration Test: Tips from an Expert Pentester

October 3, 2019
Est Read Time: 4 min
During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Vulnerabilities

Is Your Serverless App Secure?

August 6, 2019
Est Read Time: 4 min
In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Vulnerabilities

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

April 9, 2019
Est Read Time: 2 min
I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Cobalt Core Vulnerabilities