- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 166字
- 2021-07-02 12:16:38
Planning and reconnaissance
In the planning and reconnaissance phase, we define the scope of the penetration test. This initial phase requires a lot of planning, and you need to answer questions, such as:
- What is the scope of the pentest?
- What are the restricted URLs?
- What are the various subdomains in scope?
- Are there multiple applications hosted on the same domain in different folders?
- Are there any other platforms where this application is hosted (that is, mobile applications, web applications, desktop applications, and so on)
Once you have answered these questions, you will get some clarity on what is to be tested and what's not. Depending on whether it is a black box or a white box test, further enumeration takes places. In either of the cases, we will have to go ahead and discover all the files and folders of the application in scope and identify the endpoints. Later, in the next chapter, we will see how to discover new files and folders using Burp.
推薦閱讀
- 工業互聯網安全防護與展望
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 暗戰亮劍:黑客滲透與防御全程實錄
- Penetration Testing with Perl
- Getting Started with FortiGate
- 反黑命令與攻防從新手到高手(微課超值版)
- Computer Forensics with FTK
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Building a Home Security System with BeagleBone
- Instant Java Password and Authentication Security
- Web安全之深度學習實戰
- 信息安全導論(第2版)
- Mastering Reverse Engineering
- 數據安全架構設計與實戰
- Learning Pentesting for Android Devices