- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 94字
- 2021-07-16 17:53:09
Spidering and Other Data-Collection Techniques
Parallel to brute-forcing for sensitive assets, spidering can help you get a picture of a site that, without a sitemap, just brute-forcing itself can't provide. That link base can also be shared with other tools, pruned of any out-of-scope or irrelevant entries, and subjected to more in-depth analysis. There are a couple of useful spiders, each with its own advantages. The first one we'll cover, Burp's native spider functionality, is obviously a contender because it's part of (and integrates with) a tool that's probably already part of your toolset.
推薦閱讀
- 網絡安全與管理
- Web漏洞分析與防范實戰:卷1
- 網絡空間攻防技術原理
- Metasploit Penetration Testing Cookbook(Third Edition)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Practical Network Scanning
- Computer Forensics with FTK
- End to End GUI Development with Qt5
- SQL Injection Strategies
- 博弈論與數據安全
- Learning Pentesting for Android Devices
- 黑客攻防與電腦安全從新手到高手(超值版)
- 一本書讀透金融科技安全
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 極限黑客攻防:CTF賽題揭秘