- Kali Linux Web Penetration Testing Cookbook
- Gilberto Nájera Gutiérrez
- 156字
- 2021-07-16 12:53:46
Introduction
Every penetration test, be it for a network or a web application, has a workflow; it has a series of stages that should be completed in order to increase our chances of finding and exploiting every possible vulnerability affecting our targets, such as:
- Reconnaissance
- Enumeration
- Exploitation
- Maintaining access
- Cleaning tracks
In a network penetration testing scenario, reconnaissance is the phase where testers must identify all the assets in the network, firewalls, and intrusion detection systems. They also gather the maximum information about the company, the network, and the employees. In our case, for a web application penetration test, this stage will be all about getting to know the application, the database, the users, the server, and the relation between the application and us.
Reconnaissance is an essential stage in every penetration test; the more information we have about our target, the more options we will have when it comes to finding vulnerabilities and exploiting them.
- Practical Data Analysis Cookbook
- Vue.js 2 and Bootstrap 4 Web Development
- Python Geospatial Development(Second Edition)
- Visual C++數字圖像處理技術詳解
- Python+Tableau數據可視化之美
- Vue.js 2 Web Development Projects
- Julia 1.0 Programming Complete Reference Guide
- Python編程:從入門到實踐(第3版)
- 從Power BI到Analysis Services:企業級數據分析實戰
- Scala Functional Programming Patterns
- jQuery Mobile Web Development Essentials(Second Edition)
- Java自然語言處理(原書第2版)
- Building Microservices with Go
- Visual FoxPro程序設計實驗教程
- 機器人ROS開發實踐