Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

Is your penetration testing vendor just trying to sell you products and services?

By |September 17, 2020|Blog|

Not too long ago, while working at another company, I was subjected to a presentation by a paid speaker at our annual sales kickoff meeting.  Since I was heavily focused on security consulting solutions for ...

Defining the Secure Software Development Lifecycle (SSDLC)

By |June 30, 2020|Blog|

Here at Abricto Security, we believe that application penetration tests only reveal the tip of the iceberg. Specifically, if we conduct an application penetration test and we find that it’s riddled with vulnerabilities, the remediation ...

SQLmap Cheatsheet and Examples

By |April 2, 2020|Blog|

Target the URL using the "-u" flag: sqlmap -u '' Specify POST requests by specifying the "--data" flag: sqlmap -u '' --data='param1=blah&param2=blah' Target a vulnerable parameter in an authenticated session by specifying cookies using the "--cookie" ...

Go to Top