官术网_书友最值得收藏!

Stages of an application pentest

It is trivial to understand the stages of an application pentest as it lays the groundwork and ensures that the pentester covers all the possible endpoints and does an efficient scan. A web application pentest is broadly categorized in the following stages:

  • Planning and reconnaissance
  • Client end code analysis
  • Manual testing 
  • Automated testing
  • Exploiting discovered issues 
  • Digging deep for data exfiltration
  •  Taking shells
  • Reporting

Among these stages, the planning and reconnaissance stage is the most important stage, as there are possibilities that a tester might miss out critical entry endpoints into the application, and those areas might go untested. Let's explore in a little more detail what happens in each stage.

主站蜘蛛池模板: 烟台市| 东辽县| 上思县| 高要市| 永靖县| 北碚区| 原平市| 宜宾市| 聂荣县| 二连浩特市| 台北市| 石林| 新泰市| 富民县| 开江县| 吉首市| 岳阳县| 开平市| 思茅市| 文昌市| 凤凰县| 明溪县| 珠海市| 武乡县| 大化| 武强县| 肃宁县| 扶风县| 新龙县| 深圳市| 吉木萨尔县| 泾阳县| 张家口市| 永仁县| 曲阜市| 锡林浩特市| 新平| 田阳县| 锦屏县| 徐水县| 桑植县|