Web/API Penetration Test Blog by turingpoint

Blog posts about Web/API Penetration Test from our team.

Pentest: Which Components should be Considered First?
Pentest: Which Components should be Considered First?
New

For most applications, it makes sense to check the API interface first. Vulnerabilities of severity critical can arise here.

More
Does a Pentest have to be Done only Once?
Does a Pentest have to be Done only Once?

Companies often think that a single pentest before rolling out a system is sufficient. Why this assumption is a mistake?

More
What is an Ethical Hacker?
What is an Ethical Hacker?

Hackers have a bad reputation. They penetrate security systems, steal data and cause financial damage. But is that true?

More
Six Linux Distributions for Penetration Testing
Six Linux Distributions for Penetration Testing

For penetration tests, there are various Linux distributions that are precisely tailored for use in security analyses.

More
The Most Important Security Vulnerabilities in Web Applications: OWASP Top Ten
The Most Important Security Vulnerabilities in Web Applications: OWASP Top Ten

The OWASP TOP 10 provides companies with a simple overview of relevant security vulnerabilities of the year. It is produced each year by the Open Web Application Security Project.

More
Important Tools for Web Application Security Analysis
Important Tools for Web Application Security Analysis

Important tools for web application security analysisaTo counter the dangers of cybercrime, web application security analysis is indispensable. Here you will get to know the tools for this.

More
Secure Web Applications with the OWASP Framework
Secure Web Applications with the OWASP Framework

The OWASP (Open Web Application Security Project) is an NGO that aims to improve the security of web applications.

More