- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 179字
- 2021-07-16 17:53:07
Preparing for an Engagement
When you've narrowed down your search to the application you'd like to test, it's time to start collecting information. Getting a full sitemap, unmasking hidden content, and discovering artifacts left over from development (commented-out code, inline documentation, and so on) can help your narrow your focus to fertile areas. And by understanding what information you'll need for your vulnerability report, you can ensure you're collecting everything you need for when it's time to submit, right from the start.
This chapter discusses techniques to map your target application's attack surface, search the site for hidden directories and leftover (but accessible) services, make informed decisions about what tools to use in a pentesting session, and document your sessions for your eventual report.
We'll cover the following topics:
- Understanding your target application's points of interest
- Setting up and using Burp Suite
- Where to find open source lists of XSS snippets, SQLi payloads, and other code
- Gathering DNS and other network information about your target
- Creating a stable of small, versatile scripts for information-gathering
- Checking for known component vulnerabilities
- INSTANT Netcat Starter
- Wireshark 2 Quick Start Guide
- 等級保護(hù)測評理論及應(yīng)用
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- Getting Started with FortiGate
- 解密彩虹團(tuán)隊(duì)非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 軟件安全保障體系架構(gòu)
- 解密數(shù)據(jù)恢復(fù)
- CTF那些事兒
- 人工智能安全(精裝版)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- Kali Linux高級滲透測試(原書第4版)
- Securing Network Infrastructure