WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Vulnerabilities (9)

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Vulnerabilities

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Vulnerabilities

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Web Application Pentesting Vulnerabilities

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Vulnerabilities

A Pentester’s Guide to Code Injection

January 8, 2021
Est Read Time: 3 min
Learn about code injection vulnerabilities with the Pentester’s Guide to Code Injection.
Cobalt Core Vulnerabilities

A Pentester's Guide to Server Side Template Injection (SSTI)

December 24, 2020
Est Read Time: 3 min
Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side.
Cobalt Core Vulnerabilities

A Pentester’s Guide to Command Injection

December 11, 2020
Est Read Time: 3 min
Get expert insights with a command injection tutorial with insights from pentesting experts at Cobalt, a Pentest as a Service (PtaaS) provider.
Vulnerabilities

How to Execute an XML External Entity Injection (XXE)

November 26, 2020
Est Read Time: 4 min
What's XXE? An XML External Entity vulnerability is a type of attack against an application that parses XML input. This...
Vulnerabilities

A Pentester’s Guide to Cross-Site Request Forgery (CSRF)

November 13, 2020
Est Read Time: 4 min
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application...
Vulnerabilities