官术网_书友最值得收藏!

Preparing for an Engagement

When you've narrowed down your search to the application you'd like to test, it's time to start collecting information. Getting a full sitemap, unmasking hidden content, and discovering artifacts left over from development (commented-out code, inline documentation, and so on) can help your narrow your focus to fertile areas. And by understanding what information you'll need for your vulnerability report, you can ensure you're collecting everything you need for when it's time to submit, right from the start.

This chapter discusses techniques to map your target application's attack surface, search the site for hidden directories and leftover (but accessible) services, make informed decisions about what tools to use in a pentesting session, and document your sessions for your eventual report.

We'll cover the following topics:

  • Understanding your target application's points of interest
  • Setting up and using Burp Suite
  • Where to find open source lists of XSS snippets, SQLi payloads, and other code
  • Gathering DNS and other network information about your target
  • Creating a stable of small, versatile scripts for information-gathering
  • Checking for known component vulnerabilities

主站蜘蛛池模板: 哈密市| 彭泽县| 汕头市| 巨鹿县| 涪陵区| 东乡| 武城县| 莆田市| 高雄市| 宁陕县| 南乐县| 侯马市| 德钦县| 湘潭市| 峨山| 成武县| 香格里拉县| 恩施市| 揭东县| 内乡县| 泾阳县| 无棣县| 兴业县| 临泽县| 盐城市| 商洛市| 辉县市| 华蓥市| 鲁山县| 扶余县| 噶尔县| 武宁县| 宁陵县| 寿阳县| 绥棱县| 六安市| 江山市| 怀远县| 海林市| 黄冈市| 时尚|