官术网_书友最值得收藏!

Preparing for an Engagement

When you've narrowed down your search to the application you'd like to test, it's time to start collecting information. Getting a full sitemap, unmasking hidden content, and discovering artifacts left over from development (commented-out code, inline documentation, and so on) can help your narrow your focus to fertile areas. And by understanding what information you'll need for your vulnerability report, you can ensure you're collecting everything you need for when it's time to submit, right from the start.

This chapter discusses techniques to map your target application's attack surface, search the site for hidden directories and leftover (but accessible) services, make informed decisions about what tools to use in a pentesting session, and document your sessions for your eventual report.

We'll cover the following topics:

  • Understanding your target application's points of interest
  • Setting up and using Burp Suite
  • Where to find open source lists of XSS snippets, SQLi payloads, and other code
  • Gathering DNS and other network information about your target
  • Creating a stable of small, versatile scripts for information-gathering
  • Checking for known component vulnerabilities

主站蜘蛛池模板: 西平县| 平阳县| 怀集县| 云和县| 宜兴市| 无极县| 循化| 嘉定区| 浦北县| 东平县| 乌鲁木齐县| 西畴县| 九江县| 区。| 荆州市| 民和| 晋城| 德庆县| 镇雄县| 调兵山市| 乐业县| 巴南区| 宝坻区| 岑巩县| 安平县| 淮安市| 平泉县| 吴桥县| 贵南县| 湟源县| 罗甸县| 肇源县| 武隆县| 赤水市| 富平县| 保山市| 瑞丽市| 宜君县| 库尔勒市| 浦北县| 胶南市|