How it works...

Some of the names listed previously and their variations in the language the target application was created in may allow us access to restricted sections of the site, which is a very important step in a penetration test; we cannot find vulnerabilities in places if we ignore they exist. Some of them will provide us with information about the server, its configuration, and the developing frameworks used. Some others, like the Tomcat manager and JBoss administration pages, if wrongfully configured, will let us (or a malicious user) take control of the web server.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.190.93