- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 71字
- 2021-07-02 12:16:39
Pentesting cryptographic parameters
Applications where information is being sent to third parties, such as endpoints from shopping portal to payment gateway information, such as credit card details, the information is encrypted by a mutually agreed upon key. An automated scanner will not be able to scan such instances. If any endpoint is left exposed accidentally by the application, then by manual analysis, the pentester can test these cryptographic parameters for vulnerabilities.
推薦閱讀
- Metasploit Penetration Testing Cookbook(Second Edition)
- 黑客攻防入門秘笈
- 等級保護(hù)測評理論及應(yīng)用
- Computer Forensics with FTK
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- API安全技術(shù)與實(shí)戰(zhàn)
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- VMware vCloud Security
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- Mastering Metasploit
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- Manga Studio 5 Beginner's Guide