Is your penetration testing vendor just trying to sell you products and services?

2022-08-24T15:16:48+00:00September 17, 2020|Blog|

Not too long ago, while working at another company, I was subjected to a presentation by a paid speaker at our annual sales kickoff meeting.  Since I was heavily focused on security consulting solutions for ...

Defining the Secure Software Development Lifecycle (SSDLC)

2022-08-24T15:17:19+00:00June 30, 2020|Blog|

Here at Abricto Security, we believe that application penetration tests only reveal the tip of the iceberg. Specifically, if we conduct an application penetration test and we find that it’s riddled with vulnerabilities, the remediation ...

SQLmap Cheatsheet and Examples

2022-08-24T15:17:37+00:00April 2, 2020|Blog|

Target the URL using the "-u" flag: sqlmap -u '' Specify POST requests by specifying the "--data" flag: sqlmap -u '' --data='param1=blah&param2=blah' Target a vulnerable parameter in an authenticated session by specifying cookies using the "--cookie" ...

Go to Top