Insights
- All insights
- Application
- Mobile
- Network
- Uncategorized
All insights
- [5min]Application Pentesting Authentication
Pentesting AuthenticationPentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls.
- [4min]Application Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight
Pentesting ELBs - Where Vulnerabilities Hide in Plain SightVulnerabilities affecting ELBs can be easily overlooked. It’s critical for pentesters to look out for these AWS features when analyzing an attack surface.
- [9min]Application A Pentester’s Guide to Input Validation
A Pentester’s Guide to Input ValidationInput Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills.
- [6min]Application HIPAA Penetration Testing – A Primer for Healthcare Security
HIPAA Penetration Testing - A Primer for Healthcare SecurityCurious about HIPAA requirements and what it means for your pentest? Let’s review some technical examples of why pentesting in healthcare is so unique.
- [6min]Application Black Box vs. Gray Box vs. White Box Pentesting Explained
Black Box vs. Gray Box vs. White Box Pentesting ExplainedBlack Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best.
- [5min]Application Developing Like A Pentester – (And How To Reproduce Any Vulnerability)
Developing Like A Pentester - (And How To Reproduce Any Vulnerability)Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.
- [7min]Application Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User
Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird UserIn this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
- [7min]Application 5 Tips for selecting a penetration testing company in 2021
5 Tips for selecting a penetration testing company in 2021Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
- [6min]Network Evading Antivirus with Better Meterpreter Payloads
Evading Antivirus with Better Meterpreter PayloadsEver have meterpreter shells consistently fail? Anti-virus products may be causing your penetration tests to fall flat. By using unique encoded meterpreter shells you can avoid AV and elevate your penetration tests.