Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Password Cracking For Pentesters: A 5-Step Guide
A look at Heath Adams’ five step methodology for cracking password hashes to quickly establish credentialed access during a penetration test.
TCM Pentester Certification Roadmap
How can you become a pentester? Follow TCM’s learning path and go from no IT experience to a professional penetration tester.
How Often Should You Have A Pentest?
Most organizations will need at least one pentest annually, but some more frequent pentesting can be beneficial for finding vulnerabilities and reducing risk.
API Discovery with Kiterunner
Content discovery is often focused on finding files and folders. However, modern applications not longer conform to this hierarchical approach and specifically applications that use APIs. Kiterunner is a tool that can be used to discover routes and endpoints used in...
Encoding and Decoding Primer
When testing web applications, the understanding and use of various encoding schemes is a fundamental skill. Learn more about encoding and decoding schemes.
BFLA: Broken Function Level Authorization
BFLA allows unauthorized users to access functionality in API endpoints that should be restricted. Learn how to mitigate this vulnerability to secure your APIs.
The Best Apps for Keeping Notes: Pros & Cons
What is the best note-taking application for pentesters? It’s a hot debate, and if you prefer to watch than read then we recently compared many of the popular options in this video. Otherwise, let’s take a look at what each app has on offer to help you decide what’s...
ID Tokens vs Access Tokens: What’s the Difference?
In the realm of secure authentication, two key elements often come to the fore: ID tokens and access tokens. Though these elements might seem similar, understanding their differences, common pitfalls, and best practices is crucial in ensuring the security of your...
Save Time During your Next Pentest
Pentesting is inherently time-consuming. Here are some ways that we can increase the speed and efficiency of penetration testing.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








