WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Vulnerabilities (2)

A Pentester Guide to LDAP Bind Method Vulnerabilities

October 9, 2024
Est Read Time: 6 min
Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Vulnerabilities

Think Like an Attacker: Using OSINT to Safeguard Your Organization

October 4, 2024
Est Read Time: 5 min
In the cybersecurity world, knowledge is power. Threat actors have become increasingly adept at using Open-Source...
Vulnerabilities

Pentester Guide: Weak or Default Credentials

September 24, 2024
Est Read Time: 4 min
Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Vulnerabilities

What is an Attack Vector? Defending against 23 Common Attack Vectors

September 9, 2024
Est Read Time: 14 min
Attack vector management forms the foundation for effective cybersecurity. Understanding the attack vectors that...
Vulnerabilities

10 Questions with Aditya Raj Singh: Pentester Spotlight

September 5, 2024
Est Read Time: 4 min
The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Cobalt Core Vulnerabilities

Testing for Reflective XSS

June 24, 2024
Est Read Time: 16 min
Reflected XSS, also known as Reflected Cross-Site Scripting, is a dangerous vulnerability that occurs when a web...
Vulnerabilities

Browser Security: Same Origin Policy vs CORS, Misconfigurations

June 11, 2024
Est Read Time: 12 min
This blog guides how to understand and evaluate CORS (Cross-Origin Resource Sharing) misconfigurations. As pentesters,...
Vulnerabilities

LLMNR Poisoning, NTLM Relay and More

January 31, 2024
Est Read Time: 14 min
In this article we’ll touch on what are the hash types used in Windows systems, what is the LLMNR protocol, how it...
Vulnerabilities

iOS App Pentesting and Security with Real-World Case Studies Part 2

June 26, 2023
Est Read Time: 3 min
In part 2 of our IOS pentesting series, we will explore two additional case studies. One of them is about a ride-sharing app, and the other is about an E-commerce app. These case studies highlight the risks associated with insecure practices in iOS app development, such as hardcoding credentials and the exploitation of third-party libraries, emphasizing the importance of secure coding, data storage, and access control measures.
Cobalt Core Mobile Application Pentesting Vulnerabilities
    1 2 3 4 5