Menu Icon
< back to main

Pentester Guides

 • 7 min read

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a pentest engagement, time is of the essence. A pentester has a fixed amount of time, typically two weeks, to evaluate an…

Stefan Nicula
Stefan Nicula
Pentester Guides
A Pentester’s Guide to Command Injection
 • 5 min read

A Pentester’s Guide to Command Injection

Get expert insights with a command injection tutorial with insights from pentesting experts at Cobalt, a Pentest as a Service (PtaaS) provider.

A Pentester’s Guide to HTTP Request Smuggling
 • 5 min read

A Pentester’s Guide to HTTP Request Smuggling

Busra Demir examines the attack technique, HTTP Request Smuggling. Exploring what it is and how it works.

A Pentester’s Guide to WebSocket Pentesting
 • 6 min read

A Pentester’s Guide to WebSocket Pentesting

What is WebSocket Hijacking?

Kerberoast Attack Techniques
 • 5 min read

Kerberoast Attack Techniques

In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique). I will try to cover the basics about Kerberos…

Pentester Diaries Ep4: Beyond Security Hygiene
 • 23 min read

Pentester Diaries Ep4: Beyond Security Hygiene

Pentester Diaries Ep4: Beyond Security Hygiene

From SSRF to Port Scanner
 • 5 min read

From SSRF to Port Scanner

How to convert a SSRF vulnerability into a Port Scanner

Parameter Tampering Vulnerability Using 3 Different Approaches
 • 4 min read

Parameter Tampering Vulnerability Using 3 Different Approaches

Core Pentester Seli Feta has created a blog to help readers understand how online payments work and offer steps for learning how to execute Parameter Tampering attacks

Never miss a story

Stay updated about Cobalt news as it happens