Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

Pentester Guides (7)

Getting Started with Android Application Security

Security has always been a major concern for businesses, and this concern is even greater when it comes to mobile...
Jun 7, 2021
Est Read Time: 13 min

Pentester Diaries Ep5: Understanding Severity Ratings

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Jun 2, 2021
Est Read Time: 12 min

How to Write an Effective Pentest Report: Vulnerability Reports

The pentest process is not limited to executing various test cases to identify security vulnerabilities. It is a...
May 17, 2021
Est Read Time: 9 min

Pentester Diaries Ep4: Beyond Security Hygiene

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
May 12, 2021
Est Read Time: 15 min

Anatomy of the Session Management Tests

Note: This article has been created in light of the OWASP standards and descriptions.
Mar 19, 2021
Est Read Time: 6 min

Pentester Diaries Ep1: Understanding Business Logic

We are excited to share the first episode of a new podcast series, Pentester Diaries.
Mar 11, 2021
Est Read Time: 22 min

Got Cookies? Exploring Cookie Based Authentication Vulnerabilities in the Wild

Cookies are a widely used way to enable authentication in many of the applications out there. Over time, there has been...
Mar 2, 2021
Est Read Time: 6 min

A Pentester’s Guide to File Inclusion

Read the Pentester’s Guide to File Inclusion for key insights into this common vulnerability.
Feb 19, 2021
Est Read Time: 4 min

Scope Based Recon Methodology: Exploring Tactics for Smart Recon

Reconnaissance (aka Recon) is an essential process in pentesting, especially Black Box Pentesting, where you don't have...
Feb 16, 2021
Est Read Time: 10 min
    5 6 7 8 9