WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Web Application Pentesting

A Penetration Tester's Guide To Web Applications

March 29, 2023
Est Read Time: 5 min
Cybersecurity teams constantly need to adapt and protect networks against new vulnerabilities and maintain their...
Pentester Guides Web Application Pentesting

Hacking Web Cache - Deep Dive in Web Cache Poisoning Attacks

January 31, 2023
Est Read Time: 9 min
Web cache poisoning is an attack where an attacker takes advantage of flaws in the caching mechanism. They attempt to store an altered and malicious response in the cache entry, forcing the website to serve malicious information to its users.  Core Pentester Harsh Bothra deep dives into these attacks and remediations.
Cobalt Core Pentester Guides Web Application Pentesting

Web Socket Vulnerabilites

September 27, 2022
Est Read Time: 9 min
WebSockets are an exciting technology that has been gaining traction in the industry. Many companies are using the technology, especially in their real-time services
Cobalt Core Pentester Guides Web Application Pentesting

What is Web Application Penetration Testing?

November 2, 2021
Est Read Time: 3 min
Web application pentesting is the best method of discovering flaws in web applications. Otherwise known as penetration...
Modernizing Pentesting Web Application Pentesting

A Pentester’s Guide to WebSocket Pentesting

February 5, 2021
Est Read Time: 4 min
What is WebSocket Hijacking? As OWASP states, the HTTP protocol only allows one request/response per TCP connection....
Pentester Guides Web Application Pentesting