Pentesting Authentication

| | application
Pentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls. The post Pentesting Authentication appeared first on Virtue Security ... Read More
ALB Drop Invalid Headers

Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight

| | application
Vulnerabilities affecting ELBs can be easily overlooked. It's critical for pentesters to look out for these AWS features when analyzing an attack surface. The post Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight appeared first on Virtue Security ... Read More

A Pentester’s Guide to Input Validation

| | application
Input Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills. The post A Pentester’s Guide to Input Validation appeared first on Virtue Security ... Read More

HIPAA Penetration Testing – A Primer for Healthcare Security

| | application
Curious about HIPAA requirements and what it means for your pentest? Let's review some technical examples of why pentesting in healthcare is so unique. The post HIPAA Penetration Testing – A Primer for Healthcare Security appeared first on Virtue Security ... Read More
Black box - enumeration

Black Box vs. Gray Box vs. White Box Pentesting Explained

| | application
Black Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best. The post Black Box vs. Gray Box vs. White Box Pentesting Explained appeared first on Virtue Security ... Read More
Burp download

Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

| | application
Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn't have to be. The post Developing Like A Pentester – (And How To Reproduce Any Vulnerability) appeared first on Virtue Security ... Read More
Chrome phishing email

Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User

| | application
In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters. The post Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User appeared first on Virtue Security ... Read More
Pentest company cost breakdown

5 Tips for selecting a penetration testing company in 2021

| | application
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success. The post 5 Tips for selecting a penetration testing company in 2021 appeared first on Virtue Security ... Read More
Evading Antivirus with Better Meterpreter Payloads

Evading Antivirus with Better Meterpreter Payloads

| | network
Ever have meterpreter shells consistently fail? Anti-virus products may be causing your penetration tests to fall flat. By using unique encoded meterpreter shells you can avoid AV and elevate your penetration tests. The post Evading Antivirus with Better Meterpreter Payloads appeared first on Virtue Security ... Read More
Tale of a Wormable Twitter XSS

Tale of a Wormable Twitter XSS

| | application
This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy. The post Tale of a Wormable Twitter XSS appeared first on Virtue Security ... Read More