WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Pentester Guides (11)

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Apr 9, 2019
Est Read Time: 2 min

From SSRF to Port Scanner

How to convert a SSRF vulnerability into a Port Scanner
Mar 18, 2019
Est Read Time: 4 min

.git — The Hidden Danger

Git is great versioning system that I am actively using while doing some development.
Dec 4, 2017
Est Read Time: 2 min

Kerberoast Attack Techniques

In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique).
Nov 1, 2017
Est Read Time: 5 min

Spear Phishing with Go Phish Framework

What is Spear Phishing?
Oct 17, 2017
Est Read Time: 5 min

UX-Friendly Enumeration Protection in Ruby on Rails

How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
May 23, 2017
Est Read Time: 4 min

How to Write a Great Vulnerability Assessment Report with this Template

David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Sep 28, 2016
Est Read Time: 7 min
    7 8 9 10 11