Penetration test

13 Results / Page 1 of 2

vulnerability scanners

todaySeptember 30, 2021


blog + security solutions + Website security + Penetration test Z. Oualid

What does a vulnerability scanner look for?

Vulnerability scanners are one of the most important tools for both security experts and developers. With the rise in the complexity of software developed around the world, using these tools to automate the process of finding some types of vulnerabilities is becoming necessary. Vulnerability scanners usually use the same techniques ...

selective focus photography of person holding turned on smartphone

todaySeptember 19, 2021


Mobile app security + blog + Penetration test Z. Oualid

Mobile app pentesting methodology

Performing a penetration test against your mobile application is becoming an important task for higher security. Unfortunately, performing a penetration test without following a well-defined methodology could waste time without giving an optimum result for you. Therefore, here are the different steps for the mobile application penetration testing methodology: Preparation ...

fixing a vulnerable website

todaySeptember 18, 2021


blog + secure coding + Website security + Penetration test Z. Oualid

Can you keep your website live while fixing vulnerabilities?

Fixing the discovered vulnerabilities after receiving the penetration test report is the most important process and the most time-consuming process. Therefore, one of the most common questions I get from my clients before they start the fixing process is can I keep my website online while fixing the vulnerabilities? The ...

cloud penetration testing methodology

todaySeptember 17, 2021


blog + Penetration test Z. Oualid

Cloud penetration testing methodology

Cloud infrastructure is becoming more and more used by companies around the world. Therefore, performing a penetration test against your own cloud infrastructure or your client’s cloud is becoming so important to comply with the regulations. So, here is a cloud penetration testing methodology: CSP Contract checking (verify that the ...

light fashion man people

todaySeptember 6, 2021


blog + security solutions + Website security + Penetration test Z. Oualid

The most powerful WAF evasion techniques?

A WAF is one of the most recommended security solutions for web applications. This solution was made to stop known and unknown attacks against websites. However, cyber security researchers have discovered many techniques on how to bypass those firewalls and successfully exploit vulnerabilities. So, what are the most powerful web ...