官术网_书友最值得收藏!

Preparing for an Engagement

When you've narrowed down your search to the application you'd like to test, it's time to start collecting information. Getting a full sitemap, unmasking hidden content, and discovering artifacts left over from development (commented-out code, inline documentation, and so on) can help your narrow your focus to fertile areas. And by understanding what information you'll need for your vulnerability report, you can ensure you're collecting everything you need for when it's time to submit, right from the start.

This chapter discusses techniques to map your target application's attack surface, search the site for hidden directories and leftover (but accessible) services, make informed decisions about what tools to use in a pentesting session, and document your sessions for your eventual report.

We'll cover the following topics:

  • Understanding your target application's points of interest
  • Setting up and using Burp Suite
  • Where to find open source lists of XSS snippets, SQLi payloads, and other code
  • Gathering DNS and other network information about your target
  • Creating a stable of small, versatile scripts for information-gathering
  • Checking for known component vulnerabilities

主站蜘蛛池模板: 南和县| 合作市| 岚皋县| 霍州市| 花莲市| 鹤峰县| 家居| 资中县| 宜兰市| 莱州市| 芦山县| 华亭县| 锡林郭勒盟| 资中县| 柏乡县| 凭祥市| 龙胜| 安溪县| 宜城市| 会理县| 改则县| 九台市| 绩溪县| 梨树县| 宝山区| 康平县| 苏州市| 阿荣旗| 新昌县| 商丘市| 衢州市| 珲春市| 吉水县| 临海市| 时尚| 岑巩县| 建始县| 福鼎市| 南开区| 南雄市| 桐城市|