- Kali Linux Web Penetration Testing Cookbook
- Gilberto Nájera Gutiérrez
- 156字
- 2021-07-16 12:53:46
Introduction
Every penetration test, be it for a network or a web application, has a workflow; it has a series of stages that should be completed in order to increase our chances of finding and exploiting every possible vulnerability affecting our targets, such as:
- Reconnaissance
- Enumeration
- Exploitation
- Maintaining access
- Cleaning tracks
In a network penetration testing scenario, reconnaissance is the phase where testers must identify all the assets in the network, firewalls, and intrusion detection systems. They also gather the maximum information about the company, the network, and the employees. In our case, for a web application penetration test, this stage will be all about getting to know the application, the database, the users, the server, and the relation between the application and us.
Reconnaissance is an essential stage in every penetration test; the more information we have about our target, the more options we will have when it comes to finding vulnerabilities and exploiting them.
- Azure IoT Development Cookbook
- C#完全自學教程
- 動手玩轉Scratch3.0編程:人工智能科創教育指南
- 單片機應用與調試項目教程(C語言版)
- Python時間序列預測
- Java程序設計與項目案例教程
- jQuery Mobile Web Development Essentials(Second Edition)
- Android智能手機APP界面設計實戰教程
- Data Manipulation with R(Second Edition)
- 你好!Python
- Mastering Data Analysis with R
- Selenium自動化測試實戰:基于Python
- MATLAB語言及編程實踐:生物數學模型應用
- 數據分析從入門到進階
- JavaScript啟示錄