Skip to main content

#penetration testing

9 posts tagged with "penetration testing"

Back to all tags
🧠Educationalbeginner· 4 min read

How to Read a Pentest Report Like a CEO

A practical guide for executives on how to read and understand penetration test reports—what matters, what doesn't, and how to take action.

penetration testingexecutiverisk managementSMB security+1
Read →
🧠Educationalintermediate· 6 min read

Writeup: Bypassing Broken Access Controls in a Legacy Web App

Technical writeup of identifying and exploiting broken access control vulnerabilities in a legacy web application during a penetration test.

access controlweb securitypenetration testingOWASP
Read →
🧠Educationaladvanced· 6 min read

Whitepaper: AI and Offensive Security – Practical Use Cases

Exploring how AI and LLMs are being used in offensive security operations, from reconnaissance to payload development.

AIoffensive securityautomationLLM+1
Read →
🧠Educationaladvanced· 5 min read

Bypassing WAFs: Tricks from the Field

Techniques for bypassing Web Application Firewalls during authorized penetration tests, with practical examples.

WAFbypassweb securitypenetration testing
Read →
🧠Educationalbeginner· 4 min read

What Is a Penetration Test?

A practical guide to penetration testing—what it is, why it matters, and how it helps protect your business from real-world cyberattacks.

penetration testingsecurity basicsSMB securityeducation
Read →
🧠Educationalintermediate· 10 min read

Web Fuzzing for Bug Hunters: How It Differs from Traditional Fuzzing

Learn how web fuzzing differs from traditional binary fuzzing, and how bug hunters use it to find IDORs, hidden endpoints, and logic flaws in web applications.

fuzzingweb testingbug bountypenetration testing+2
Read →
🧠Educationalbeginner· 9 min read

What to Expect During a Penetration Test

A complete guide to the penetration testing process—from kickoff to final report. Learn what happens during a pentest and how to prepare your team.

penetration testingsecurity basicsSMB securityeducation+1
Read →
🧠Educationalintermediate· 6 min read

How I Use AI to Accelerate Recon Workflows

How I integrate AI into every stage of my reconnaissance workflows as a penetration tester. Practical examples, tools, and techniques for red teamers and bug bounty hunters.

AIreconnaissanceOSINTpenetration testing+3
Read →
🧠Educationalbeginner· 5 min read

Recon 101: Tools, Targets, and Tips

Learn the fundamentals of reconnaissance in cybersecurity—what it is, why it matters, and how to perform it with free tools. Essential reading for SMBs, new security professionals, and curious tech teams.

reconnaissanceOSINTpenetration testingcybersecurity+2
Read →

Related Tags