Save Time During your Next Pentest

Save Time During your Next Pentest

Pentesting is inherently time-consuming. This constraint alone has led to the rise of scanners as well as the exclusion of regular pentesting in many modern development lifecycles. Whilst we can’t automate and deliver everything at lightspeed, there are things we can...
Clickjacking 101: What is Clickjacking and How Does it Work?

Clickjacking 101: What is Clickjacking and How Does it Work?

Clickjacking, also known as UI Redressing, is a technique that tricks users into clicking on unintended elements on a website. By using hidden elements, attackers deceive users into performing actions that they did not intend to carry out. Learn more about...
Learn WebApp Pentesting: 2023 Edition

Learn WebApp Pentesting: 2023 Edition

In 2023, there are more resources to learn new skills and progress than ever. However, this industry is also moving and growing rapidly, and more isn’t necessarily better. The phrase “drinking from a fire hose” comes to mind. Today we’re going to be looking at a path...
OWASP API Top10 2023 Candidate List, So What’s New?

OWASP API Top10 2023 Candidate List, So What’s New?

2023 Candidate List Broken Object Level Authorization Broken Authentication Broken Object Property Level Authorization Unrestricted Resource Consumption Broken Function Level Authorization Server Side Request Forgery Security Misconfiguration Lack of Protection From...
BOLA: Broken Object Level Authorization

BOLA: Broken Object Level Authorization

Broken Object Level Authorization (BOLA) is a vulnerability that occurs when an application fails to enforce access controls on sensitive data or resources. BOLA is important to understand and test for as it has been the most common and impactful vulnerability across...