GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Pentester Guides

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
Oct 9, 2024
Est Read Time: 6 min

Pentester Guide: Weak or Default Credentials

Weak or default credentials are a common security flaw that attackers can exploit with minimal effort. They often lead...
Sep 24, 2024
Est Read Time: 4 min

What is an Attack Vector? Defending against 23 Common Attack Vectors

Attack vector management forms the foundation for effective cybersecurity. Understanding the attack vectors that...
Sep 9, 2024
Est Read Time: 14 min

10 Questions with Aditya Raj Singh: Pentester Spotlight

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Sep 5, 2024
Est Read Time: 4 min

Testing for Reflective XSS

Reflected XSS, also known as Reflected Cross-Site Scripting, is a dangerous vulnerability that occurs when a web...
Jun 24, 2024
Est Read Time: 16 min

Browser Security: Same Origin Policy vs CORS, Misconfigurations

This blog guides how to understand and evaluate CORS (Cross-Origin Resource Sharing) misconfigurations. As pentesters,...
Jun 11, 2024
Est Read Time: 12 min

LLMNR Poisoning, NTLM Relay and More

In this article we’ll touch on what are the hash types used in Windows systems, what is the LLMNR protocol, how it...
Jan 31, 2024
Est Read Time: 14 min

Introduction to Secure Code Review

Code is the backbone of modern software applications. Understanding the importance of secure code development is...
Oct 11, 2023
Est Read Time: 5 min

Introduction to Access Control Vulnerabilities

What is Access Control? Access Control plays a pivotal role in performing a penetration test.
Sep 14, 2023
Est Read Time: 8 min
    1 2 3 4 5