Certified Red Team Operator Certificate Review
Certified Red Team Operator (CRTO 1) – Review and Tips Soham is an experienced Security Consultant specialising in network penetration testing, active directory exploitation, and red teaming. He e...
Certified Red Team Operator (CRTO 1) – Review and Tips Soham is an experienced Security Consultant specialising in network penetration testing, active directory exploitation, and red teaming. He e...
Overview Punit is a Managing Consultant at Cognisys Group, specialising in application security with a strong focus on offensive security and secure coding practices. With experience spanning mult...
Introduction Hack The Box (HTB) Prolab - Dante offers a challenging and immersive environment for improving penetration testing skills. This is a Red Team Operator Level 1 lab. This lab demands ex...
Overview At Cognisys, our days are filled with uncovering the intricacies of various applications, but some projects stand out due to their complexity and the insights they provide. Recently, we t...
Overview It was a typical day at Cognisys, where we were engaged in routine Android application testing. However, this session took an intriguing turn when we encountered a unique encryption imple...
At Cognisys, we are driven by experts in cybersecurity. Our team comprises individuals with extensive skills and a deep understanding of the field, always ready to secure your business. In the eve...
We daily come across login pages as normal internet users, but as a security guy, one is always curious to find ways to bypass the login panels. Hi everyone we hope you all are doing great. In this...
Overview Greetings, everyone! In this blog, our Application Security Specialist Punit, will be talking about a critical security category. Punit’s primary role within our team involves penetration...
Overview Greetings, everyone! I’m Punit, an Application Security Specialist working with Cognisys Group. My primary role involves being a Pentester with expertise in testing the security of Web, M...
Overview This blog will talk about the in-depth analysis and implementation of: Heaps allocations Encryption while sleeping Threads Stack Encryption while sleeping Reverting stomped module...