Cobalt Help Center
Group 65Go to Cobalt
All Collections
Cobalt Pentest Methodologies

Cobalt Pentest Methodologies

Here you can learn about the methodologies we follow for pentests at Cobalt as a baseline.

Esben avatar Sam Singh avatar
10 articles in this collection
Written by Esben and Sam Singh
Methodologies

Web Application Pentest Methodology

Esben avatar
Written by Esben
Updated over a week ago

API Pentest Methodology

Esben avatar
Written by Esben
Updated over a week ago

Mobile Application Pentest Methodology

Esben avatar
Written by Esben
Updated over a week ago

External Network Pentest Methodology

Esben avatar
Written by Esben
Updated over a week ago

Internal Network Pentest Methodology

Esben avatar
Written by Esben
Updated over a week ago

AWS Cloud Config Assessment Methodology

Esben avatar
Written by Esben
Updated over a week ago

Google Cloud Platform Cloud Config Assessment Methodology

Sam Singh avatar
Written by Sam Singh
Updated over a week ago

Network + Office 365 Penetration Testing

Sam Singh avatar
Written by Sam Singh
Updated over a week ago
Methodology FAQ

Cloud Configuration Review VS Cloud Network Pentest

Sam Singh avatar
Written by Sam Singh
Updated over a week ago

Pentesting for PCI

Sam Singh avatar
Written by Sam Singh
Updated over a week ago
Cobalt Help Center
Intercom We run on Intercom