by Alex Olsen | Jul 26, 2023 | Learning, Penetration Testing, Security
Why Linux Skills are Invaluable for Pentesters Linux, an open-source operating system, forms the backbone of modern infrastructure. Being comfortable with Linux thus opens up a vast array of systems and servers for you to better be able to understand, evaluate and...
by Alex Olsen | Jul 19, 2023 | Blog, Security, Web Applications
The rapidly evolving world of cybersecurity brings with it an ever-expanding catalogue of threats. One such vulnerability, which has been gaining traction recently in the API space, is Server-Side Request Forgery (SSRF). Though it’s not a new concept, SSRF has...
by Alex Olsen | Jul 12, 2023 | Penetration Testing, Security, Web Applications
Bug bounty programs have been a popular phenomenon in the tech industry for the last decade or so. They’re an opportunity for anyone to identify vulnerabilities in a company’s software or infrastructure and get rewarded for their discoveries. But, how do...
by Alex Olsen | May 24, 2023 | Penetration Testing, Security, Web Applications
What is the best note-taking application for pentesters? It’s a hot debate, and if you prefer to watch than read then we recently compared many of the popular options in this video (https://www.youtube.com/watch?v=KpX7v5Ym3wg). Otherwise, let’s take a look at what...
by Alex Olsen | May 17, 2023 | Penetration Testing, Security, Web Applications
In the realm of secure authentication, two key elements often come to the fore: ID tokens and access tokens. Though these elements might seem similar, understanding their differences, common pitfalls, and best practices is crucial in ensuring the security of your...
by Alex Olsen | May 10, 2023 | Penetration Testing, Security
Pentesting is inherently time-consuming. This constraint alone has led to the rise of scanners as well as the exclusion of regular pentesting in many modern development lifecycles. Whilst we can’t automate and deliver everything at lightspeed, there are things we can...