WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

.git — The Hidden Danger

Git is great versioning system that I am actively using while doing some development.
Dec 4, 2017
Est Read Time: 2 min

Vendor Security Questionnaires: The Buyer’s Perspective

Tips on vendor assessments from experts in the industry
Dec 4, 2017
Est Read Time: 6 min

4 Tips to Successfully Kick Off a Pentest

My name is Kevin Bourne and I’m the Customer Success Manager at Cobalt. Over the past six months, I’ve kicked off +150...
Nov 7, 2017
Est Read Time: 3 min

Kerberoast Attack Techniques

In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique).
Nov 1, 2017
Est Read Time: 5 min

3 Tips for Preparing for a Pentest

I’m the Chief Operations Officer at Cobalt, a Pen Testing as a Service company that has performed over 5800 pentests...
Oct 24, 2017
Est Read Time: 2 min

Spear Phishing with Go Phish Framework

What is Spear Phishing?
Oct 17, 2017
Est Read Time: 5 min

7 Steps to Building a Yearly Pentest Plan

Pentesting is a great way to check your security posture and is an essential part of an application security program....
Oct 17, 2017
Est Read Time: 4 min

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Oct 11, 2017
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.