CovertSwarmNov 3, 20212 minWhat is Session Hijacking?Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other...
CovertSwarmNov 3, 20211 minRetail Penetration TestWhat types of penetration testing do retail stores need? The types of penetration testing that retail stores need will directly be linked...
CovertSwarmNov 3, 20211 minMalicious CodeWhat is malicious code and what can it do? Malicious code usually performs actions against the user’s interest. This might be for example...
CovertSwarmNov 3, 20211 minCEH CertificationWhat are the prerequisites for doing CEH certification CEH or Certified Ethical Hacker (EC-Council) has a recommended requirement of two...
CovertSwarmOct 22, 20212 minWhat is a Session Fixation Attack?Session Fixation is an attack that allows a malicious actor to hijack a valid user session by forcing that user to use a fixed session ID.
CovertSwarmOct 22, 20211 minWhat is Penetration Testing Software?Penetration testing software is the toolset of penetration testers. Learn more.
CovertSwarmOct 22, 20211 minWhat is a Network Penetration Test?Network penetration tests are used to identify security weaknesses within the networks (both internal networks and external networks)....
CovertSwarmOct 22, 20212 minWhat is a Computer Worm?A computer worm is a type of malware that propagates itself across a network by replication itself from host to host independently. They...
CovertSwarmOct 22, 20211 minWhat is Enumeration in Cyber Security?Cyber security enumeration is a process used by both security professionals and attackers alike to establish a collective knowledge of...
CovertSwarmOct 11, 20215 minWhat is Vishing?‘Vishing’ is a social engineering attack vector that uses the telephone (phone) network as a method to target potential victims. Learn more.
CovertSwarmOct 8, 20218 minRed Teaming vs Penetration TestingRed Teaming and Penetration Testing are useful practices for organizations looking to improve their security. Learn more.
CovertSwarmSep 24, 20211 minCan You Pentest AWS?Unless you are working directly with AWS then you will not be able to run a pentest against the AWS cloud environment directly. You are...
CovertSwarmSep 24, 20211 minWhat is an SQL Injection Attack?SQL (Structured Query Language) injection is an attack that exploits an insecure coding weakness within an application that interacts...
CovertSwarmSep 24, 20211 minWhat is Broken Authentication?Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or application.
CovertSwarmSep 24, 20212 minIs Linux Good for Ethical Hacking?Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors...
CovertSwarmSep 24, 20211 minIs Open Source or Proprietary More Secure?Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security...
CovertSwarmSep 24, 20211 minWhat is the Information Security CIA?The CIA triad is a security model of three core principles used within IT security and Information Security policies within an organisation.
CovertSwarmSep 22, 20211 minWhat is a Purple Team Assessment?Unlike the red team engagements, the purple-team testing is a collaborative exercise between both the red team and the blue team. Learn more
CovertSwarmSep 22, 20211 minWhat is a Red Team Assessment?A red-team assessment is a simulated attack against an organisation using real-world information and threat intelligence analysis...
CovertSwarmSep 22, 20212 minWhat is a Physical Penetration Test?A physical penetration test is where an ethical hacker or social engineer will try to gain entry to one of your locations. Learn more.