- Kali Linux Web Penetration Testing Cookbook
- Gilberto Nájera Gutiérrez
- 156字
- 2021-07-16 12:53:46
Introduction
Every penetration test, be it for a network or a web application, has a workflow; it has a series of stages that should be completed in order to increase our chances of finding and exploiting every possible vulnerability affecting our targets, such as:
- Reconnaissance
- Enumeration
- Exploitation
- Maintaining access
- Cleaning tracks
In a network penetration testing scenario, reconnaissance is the phase where testers must identify all the assets in the network, firewalls, and intrusion detection systems. They also gather the maximum information about the company, the network, and the employees. In our case, for a web application penetration test, this stage will be all about getting to know the application, the database, the users, the server, and the relation between the application and us.
Reconnaissance is an essential stage in every penetration test; the more information we have about our target, the more options we will have when it comes to finding vulnerabilities and exploiting them.
- Modular Programming with Python
- FreeSWITCH 1.8
- Testing with JUnit
- R語言經典實例(原書第2版)
- Mastering C# Concurrency
- Lua程序設計(第4版)
- Learning Zurb Foundation
- Java編程的邏輯
- HTML 5與CSS 3權威指南(第3版·上冊)
- OpenResty完全開發指南:構建百萬級別并發的Web應用
- Practical Maya Programming with Python
- Neo4j 3.x入門經典
- Using Yocto Project with BeagleBone Black
- Kotlin語言實例精解
- Microsoft XNA 4.0 Game Development Cookbook