Insights
- All insights
- Application
- Mobile
- Network
- Uncategorized
Application
- [5min]Application Pentesting Authentication
Pentesting AuthenticationPentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls.
- [4min]Application Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight
Pentesting ELBs - Where Vulnerabilities Hide in Plain SightVulnerabilities affecting ELBs can be easily overlooked. It’s critical for pentesters to look out for these AWS features when analyzing an attack surface.
- [9min]Application A Pentester’s Guide to Input Validation
A Pentester’s Guide to Input ValidationInput Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills.
- [6min]Application HIPAA Penetration Testing – A Primer for Healthcare Security
HIPAA Penetration Testing - A Primer for Healthcare SecurityCurious about HIPAA requirements and what it means for your pentest? Let’s review some technical examples of why pentesting in healthcare is so unique.
- [6min]Application Black Box vs. Gray Box vs. White Box Pentesting Explained
Black Box vs. Gray Box vs. White Box Pentesting ExplainedBlack Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best.
- [5min]Application Developing Like A Pentester – (And How To Reproduce Any Vulnerability)
Developing Like A Pentester - (And How To Reproduce Any Vulnerability)Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.
- [7min]Application Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User
Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird UserIn this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
- [7min]Application 5 Tips for selecting a penetration testing company in 2021
5 Tips for selecting a penetration testing company in 2021Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
- [2min]Application Tale of a Wormable Twitter XSS
Tale of a Wormable Twitter XSSThis is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.