Vulnerabilities affecting ELBs can be easily overlooked. It’s critical for pentesters to look out for these AWS features when analyzing an attack surface.
Input Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills.
API pentesting is a frequently misunderstood area of application security. Let’s review core concepts of API pentesting and look at how these assessments are performed.
Curious about HIPAA requirements and what it means for your pentest? Let’s review some technical examples of why pentesting in healthcare is so unique.
Black Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best.
Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start.
Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.
In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.