- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 94字
- 2021-07-16 17:53:09
Spidering and Other Data-Collection Techniques
Parallel to brute-forcing for sensitive assets, spidering can help you get a picture of a site that, without a sitemap, just brute-forcing itself can't provide. That link base can also be shared with other tools, pruned of any out-of-scope or irrelevant entries, and subjected to more in-depth analysis. There are a couple of useful spiders, each with its own advantages. The first one we'll cover, Burp's native spider functionality, is obviously a contender because it's part of (and integrates with) a tool that's probably already part of your toolset.
推薦閱讀
- unidbg逆向工程:原理與實踐
- 網(wǎng)絡安全技術及應用(第3版)
- 黑客攻防與無線安全從新手到高手(超值版)
- .NET安全攻防指南(上冊)
- Web安全之深度學習實戰(zhàn)
- 安全防御入門手冊
- 網(wǎng)絡安全態(tài)勢感知
- 白話零信任
- Cybersecurity Threats,Malware Trends,and Strategies
- 黑客攻防與電腦安全從新手到高手(超值版)
- 5G網(wǎng)絡安全規(guī)劃與實踐
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡安全報告
- 惡意軟件、Rootkit和僵尸網(wǎng)絡
- 反黑風暴:黑客社會工程學攻防演練
- 工業(yè)控制系統(tǒng)網(wǎng)絡安全實戰(zhàn)