Syndicated Blog

Blog – Virtue Security
Current research on vulnerability assessments and penetration testing.

Pentesting Authentication

| | application
Pentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls. The post Pentesting Authentication appeared first on Virtue Security ...

Pentesting Authentication

| | application
Pentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls. The post Pentesting Authentication appeared first on Virtue Security ...
ALB Drop Invalid Headers

Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight

| | application
Vulnerabilities affecting ELBs can be easily overlooked. It's critical for pentesters to look out for these AWS features when analyzing an attack surface. The post Pentesting ELBs – Where Vulnerabilities Hide in ...
ALB Drop Invalid Headers

Pentesting ELBs – Where Vulnerabilities Hide in Plain Sight

| | application
Vulnerabilities affecting ELBs can be easily overlooked. It's critical for pentesters to look out for these AWS features when analyzing an attack surface. The post Pentesting ELBs – Where Vulnerabilities Hide in ...

A Pentester’s Guide to Input Validation

| | application
Input Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills. The post A Pentester’s Guide to Input Validation ...

A Pentester’s Guide to Input Validation

| | application
Input Validation is a fundamental concept of penetration testing. This guide is written for new pentesters and developers looking to bolster these core skills. The post A Pentester’s Guide to Input Validation ...
API Penetration Testing Explained

API Penetration Testing Explained

| | application
API pentesting is a frequently misunderstood area of application security. Let's review core concepts of API pentesting and look at how these assessments are performed. The post API Penetration Testing Explained appeared ...

HIPAA Penetration Testing – A Primer for Healthcare Security

| | application
Curious about HIPAA requirements and what it means for your pentest? Let's review some technical examples of why pentesting in healthcare is so unique. The post HIPAA Penetration Testing – A Primer ...

HIPAA Penetration Testing – A Primer for Healthcare Security

| | application
Curious about what HIPAA requirements mean for your pentest? Let's review some technical examples of why pentesting in healthcare is so unique. The post HIPAA Penetration Testing – A Primer for Healthcare ...
Black box - enumeration

Black Box vs. Gray Box vs. White Box Pentesting Explained

| | application
Black Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best. The post Black Box vs ...