WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Vulnerabilities (9)

A Pentester’s Guide to File Inclusion

February 19, 2021
Est Read Time: 4 min
Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Cobalt Core Vulnerabilities

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

February 16, 2021
Est Read Time: 10 min
Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Vulnerabilities

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Web Application Pentesting Vulnerabilities

Bypassing the Protections — MFA Bypass Techniques for the Win

January 27, 2021
Est Read Time: 6 min
Multi-Factor Authentication (MFA) often known as Two-Factor Authentication (2FA) is an added layer of protection added...
Vulnerabilities

A Pentester’s Guide to Code Injection

January 8, 2021
Est Read Time: 3 min
Learn about code injection vulnerabilities with the Pentester’s Guide to Code Injection.
Cobalt Core Vulnerabilities

A Pentester's Guide to Server Side Template Injection (SSTI)

December 24, 2020
Est Read Time: 3 min
Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side.
Cobalt Core Vulnerabilities

A Pentester’s Guide to Command Injection

December 11, 2020
Est Read Time: 3 min
Get expert insights with a command injection tutorial with insights from pentesting experts at Cobalt, a Pentest as a Service (PtaaS) provider.
Vulnerabilities

How to Execute an XML External Entity Injection (XXE)

November 26, 2020
Est Read Time: 4 min
What's XXE? An XML External Entity vulnerability is a type of attack against an application that parses XML input. This...
Vulnerabilities

A Pentester’s Guide to Cross-Site Request Forgery (CSRF)

November 13, 2020
Est Read Time: 4 min
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application...
Vulnerabilities