Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Web Application Security Testing
AI penetration testing

As an AI Language Model, Please Have Mercy on Me

Before starting, there is one thing to clarify. This article is not about “How to use the benefits of AI language models while conducting penetration test”. This article is about “How to conduct a penetration test towards AI language models”. With that said, please do not forget business logic vulnerabilities. For example, if an AI […]

Web Application Security Testing
types of penetration testing

Black-box vs. Grey-box vs. White-box: Which Penetration Test Is Right for You?

You need to know if your company’s security controls and defenses can withstand a real cyber attack. Penetration testing is how you find out, but with three main types, black-box, grey-box, and white-box, how do you choose? Don’t worry, we’ve got you covered. Penetration tests can sound intimidating, but it’s one of the best ways […]

Web Application Security Testing
stored xss

Web Administration Gone Wrong: How User Passwords Can be Compromised

Introduction According to this paper, %65 of web applications suffer from cross-site scripting vulnerabilities. I am going to explain the Stored Cross-Site Scripting (XSS) vulnerability I found in an open-source project in this article. The main causes of stored cross-site scripting (stored XSS) vulnerabilities in web applications are neglect to implement security measures at the […]

Web Application Security Testing
good hackers

Cybersecurity for startups – recruit the good hackers

Recruiting good hackers who can test your startup’s technologies for hidden vulnerabilities is essential to ensure your startup has a solid security posture because implementing multiple security measures is not enough. These “good hackers” who are also known as ethical hackers emulate a malicious actor’s adversarial behaviors and search for weaknesses or vulnerabilities in your […]