- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 119字
- 2021-07-02 12:16:38
Stages of an application pentest
It is trivial to understand the stages of an application pentest as it lays the groundwork and ensures that the pentester covers all the possible endpoints and does an efficient scan. A web application pentest is broadly categorized in the following stages:
- Planning and reconnaissance
- Client end code analysis
- Manual testing
- Automated testing
- Exploiting discovered issues
- Digging deep for data exfiltration
- Taking shells
- Reporting
Among these stages, the planning and reconnaissance stage is the most important stage, as there are possibilities that a tester might miss out critical entry endpoints into the application, and those areas might go untested. Let's explore in a little more detail what happens in each stage.
推薦閱讀
- RESTful Java Web Services Security
- Extending Symfony2 Web Application Framework
- CSO進階之路:從安全工程師到首席安全官
- API攻防:Web API安全指南
- 網(wǎng)絡運維親歷記 (網(wǎng)絡運維紀實文學)
- 網(wǎng)絡安全技術與實訓(第4版)(微課版)
- 從0到1:CTFer成長之路
- 信息安全案例教程:技術與應用(第2版)
- Falco云原生安全:Falco原理、實踐與擴展
- Kerberos域網(wǎng)絡安全從入門到精通
- 博弈論與數(shù)據(jù)安全
- Bug Bounty Hunting Essentials
- 網(wǎng)絡空間安全:拒絕服務攻擊檢測與防御
- CTF快速上手:PicoCTF真題解析(Web篇)
- INSTANT Kali Linux