- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 179字
- 2021-07-16 17:53:07
Preparing for an Engagement
When you've narrowed down your search to the application you'd like to test, it's time to start collecting information. Getting a full sitemap, unmasking hidden content, and discovering artifacts left over from development (commented-out code, inline documentation, and so on) can help your narrow your focus to fertile areas. And by understanding what information you'll need for your vulnerability report, you can ensure you're collecting everything you need for when it's time to submit, right from the start.
This chapter discusses techniques to map your target application's attack surface, search the site for hidden directories and leftover (but accessible) services, make informed decisions about what tools to use in a pentesting session, and document your sessions for your eventual report.
We'll cover the following topics:
- Understanding your target application's points of interest
- Setting up and using Burp Suite
- Where to find open source lists of XSS snippets, SQLi payloads, and other code
- Gathering DNS and other network information about your target
- Creating a stable of small, versatile scripts for information-gathering
- Checking for known component vulnerabilities
- 信息安全導論(在線實驗+在線自測)
- 工業互聯網安全
- Practical Network Scanning
- INSTANT Metasploit Starter
- 暗戰亮劍:黑客滲透與防御全程實錄
- 等級保護測評理論及應用
- 反黑命令與攻防從新手到高手(微課超值版)
- 軟件開發安全之道:概念、設計與實施
- 安全防御入門手冊
- Learning Pentesting for Android Devices
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 信息內容安全管理及應用
- Web代碼安全漏洞深度剖析
- CTF網絡安全競賽入門教程
- 黑客攻防從入門到精通:絕招版(第2版)