Category:
Penetration Testing
Securing Your Mobile Application: The Importance of Mobile Application Penetration Test
The reliance on mobile applications, and how they are used everyday to handle our sensitive data and organisations premium services, necessitates a robust approach to security. In the below blog, it demonstrated that attackers exploiting vulnerabilities in mobile applications pose a significant threat to organisations. Read on to know how mobile application penetration testing emerges as a crucial proactive measure to simulate real-world attacks and uncover vulnerabilities.
CVE-2023-22626 Error Based SQL Injection on PGHero
I was able to find two CVEs in a short period of time during a project I am working on last year. In this article, I will detail one of the vulnerabilities I discovered within PgHero.
A Pentesting Guide To Intercepting Traffic From Flutter-Based Applications For Android & iOS
Flutter’s built-in security features on mobile applications can present problems for penetration testers in intercepting HTTP traffic. In this blog post, I detail the steps I took in circumventing this problem.
An Introduction To Pentesting Cloud Computing Environments
A penetration test on a cloud computing environment does not differ that much from any other penetration test, even an on-premise equivalent. So what do you need to know?
Here’s What You Need To Conduct A Network Pentest
Network penetration tests can range from Red Teaming to Targeted Host Penetration Testing. What ports and subnets are involved, and what tools should you use? See how a typical network pentest is performed in a client environment.
Web App Pentesting With Horangi
It's no secret that the Internet can be a double-edged sword. It deeply enhances our daily lives but behind it are people who are fallible just like you and I. A critical vulnerability in a public web application is an open door for attackers.
Everything You Need To Know About Web Server Pentesting
A pentest doesn’t just reveal your vulnerabilities, but also the competence of your security or development team. We discuss the various exploitable target areas in a server.
A Day In The Life Of A Pentester
Eddie Tan shares his typical day as a Penetration Tester at Horangi, including his day-to-day responsibilities, challenges he faces, as well as the skills he needs on the job.
Pentesting Tools & Resources To Get You Started
Entering the world of penetration testing can be a daunting task but we've put together a guide on how you can familiarize yourself with platforms, security tools, and other useful resources to help you get started.
4 Reasons Why Penetration Testing Is Important
Discover why penetration testing is essential for the health and security of your organization's systems and infrastructure, as we also reveal the massive financial damage in the wake of security incidents.
Between The Shades: Black, White & Gray-Box Penetration Testing
Black-box, gray-box, and white-box penetration testing are popular terms to describe the three primary types of penetration testing. How did they come about and what is the significance of each?
Does Pentesting Make Sense For Small Businesses?
No organization is too small to be targeted. All an attacker needs is one entry point to find a way into something bigger. So how can small businesses use a penetration test strategically to fit their limited budget?
Is Penetration Testing Sufficient For A Security Audit?
Pentesting may be one of the most popular practices in cybersecurity, but is it the same as a vulnerability assessment and is it comprehensive enough for your organization’s security workflow?
How Much Does A Penetration Test Cost?
Learn the various types and scales of pentesting that you can do, the quality of pentesters available in the market, and what you can expect to pay for a typical penetration test.
Android App Penetration Testing Made Easy
A quick penetration testing tutorial that provides a framework for security professionals to test the security of their Android applications.
Pentesting Methodology 101
Penetration testing is an authorized simulation of an attack on a system, network, or application to find potential vulnerabilities that can be exploited. Pentesting can be loosely placed into 3 categories, black, gray or white box testing.
AutoSploit: More harm or good for pentesting?
Tools enable a penetration tester to perform repetitive tasks faster in a more timely manner, achieving the objective in the quickest time without increasing the time spent or manpower to complete.