- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 246字
- 2021-07-02 12:16:36
Initiating a penetration test
An application penetration test is always said to be incomplete if it does not do the following:
- Following the standard methodology of performing recon
- Enumerating functionality
- Testing individual parameters
- Creating test cases
- Performing non-invasive exploitation
- Providing a report that talks about the issue
- Implementing steps to reproduce, proof of concept code, and possible mitigation
During my career, on numerous occasions, I have come across security consulting companies or independent professionals that are known to run an automated scanner that detects only a handful of vulnerabilities and almost always does not discover logical issues. These vulnerabilities are then exploited with a half-baked exploit that does very little in terms of explaining the business impact and criticality of the findings to the end client.
Scanning for vulnerabilities using an automated scanner is the most common approach taken when it comes to detecting vulnerabilities quickly. This can result in both actionable and complete results or in-actionable and incomplete findings. This very heavily depends on what information was fed to the scanner in the first place.
Using an automated scanner isn't bad. In fact, using a scanner can ensure completeness in a lot of cases. However, the methodology of using a scanner without performing sufficient recon, assigning, and creating target maps can result in the tool being used incorrectly and producing incomplete results.
A tool is only as good as the information it receives before beginning execution. Therefore, scoping your pentest is very important.
- unidbg逆向工程:原理與實踐
- 腦洞大開:滲透測試另類實戰(zhàn)攻略
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 安全實戰(zhàn)之滲透測試
- .NET安全攻防指南(上冊)
- 數(shù)據(jù)安全與隱私計算(第3版)
- 網(wǎng)絡(luò)空間安全實驗
- 云原生安全與DevOps保障
- 學(xué)電腦安全與病毒防范
- Web安全之深度學(xué)習(xí)實戰(zhàn)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- 從實踐中學(xué)習(xí)密碼安全與防護
- 網(wǎng)絡(luò)安全態(tài)勢感知
- Learning Pentesting for Android Devices
- Mastering Linux Security and Hardening