How to detect injection flaws with Pentest-Tools.comWhether you’re a penetration tester, bug bounty hunter, or security pro, you’re probably familiar with all the OWASP Top 10 vulnerabilities affecting web applications.Author(s)Cristian CorneaPublished at19 Mar 2021Updated at09 Jun 2023
4 platform updates you need to know aboutIt’s been an intense start to the New Year and we’re excited to share what we worked on! These 4 platform improvements are all about streamlining your workflow, so you can focus on the important tasks.Author(s)Ioana RijnetuPublished at21 Feb 2021Updated at07 Jul 2022
Pentest Robots - rocket fuel for pentesters, not their replacementLet me say this from the start: full automation is the wrong approach for scaling penetration testing. The whole “machines will replace humans” view doesn’t sit well with us. It’s too simplistic and it fails to capture the complexity and depth involved in security testing and the larger information security ecosystem. So how come we launched pentest robots - an automation feature - at Black Hat Europe 2020?Author(s)Andra ZahariaPublished at10 Dec 2020Updated at18 Jul 2023
Work like a pro: 4 automation updates to save time and simplify your workflowWe worked hard this month to roll out new updates and we’re excited to share them with you! These 4 platform features are all about making your workflow smoother, so you can focus on the essential tasks:Author(s)Ioana RijnetuPublished at17 Nov 2020Updated at18 Jul 2023
Discover how dangerous a ‘Bad Neighbor’ can be - TCP/IP Vulnerability (CVE-2020-16898)Patching is never easy, but doing it imperfectly can come back to bite you. That’s why today we’re unpacking a vulnerability that can resurface when improperly mitigated.Author(s)Cristian CorneaPublished at03 Nov 2020Updated at18 Jul 2023
Work smarter, not harder: 5 updates to enhance automationIt’s been an intense month and we’re excited to share the news! These 5 platform improvements are all about saving you time and energy, so you can focus on your most important tasks.Author(s)Ioana RijnetuPublished at26 Oct 2020Updated at07 Jul 2022
Why Zerologon is the silent threat in your networkNo red flags. No alerts. Full-on compromise. The way cybercriminals are putting together various vulnerabilities within the Microsoft infrastructure, including Zerologon vulnerability (CVE-2020-1472), is more than a trending topic in the infosec community. It’s a massive threat for organizations small and large.Author(s)Cristian CorneaPublished at21 Oct 2020Updated at18 Jul 2023
Why we continue to support young people find their way in infosecLifelong learning, constant practice, and the need to share knowledge and ideas with others are the reasons that got us in the infosec community. Because we all try to do our best in the work we do and have a positive impact on our field. And for that, we need to remind ourselves to stay engaged and always practice what we preach.Author(s)Ioana RijnetuPublished at15 Oct 2020Updated at16 Jan 2023
4 updates for next-level automation in security testingHere are 4 platform improvements we’ve deployed to make Pentest-Tools.com a must-have for your security testing tool stack: Mark False Positives for future scans, Target description - automatically added to reports, Enable & configure email scan notifications, Login session timeout increasedAuthor(s)Ioana RijnetuPublished at05 Oct 2020Updated at18 Jul 2023
[New feature] Discover your Network’s Attack SurfaceWhat if you could automatically… Get an instant overview of your network perimeter exposure? Find open ports that shouldn’t be publicly accessible at a glance? Detect old and forgotten web technologies from a centralized view?Author(s)Ioana RijnetuPublished at18 Sep 2020Updated at02 Aug 2022
New VPN agent formats, API methods, filters & other updatesHere are 4 platform improvements we’ve worked on in the current update to make Pentest-Tools.com a must-have asset for your pentesting toolbox.Author(s)Ioana RijnetuPublished at25 Aug 2020Updated at07 Jul 2022
Find out why lower-severity vulns are the bigger painSometimes headline-making vulnerabilities aren’t necessarily the ones causing the most burning challenges for companies. What makes a difference during uncertain times is identifying the key focus points needed to support business priorities.Author(s)Ioana RijnetuPublished at29 Jul 2020Updated at07 Jul 2022