Web application security blueprints and checklists

When performing a penetration test on a system or network, a set of approved or recommended guidelines is used to ensure that the desired outcome is achieved. A penetrating testing methodology usually consists of the following phases:

  1. Information gathering
  2. Scanning and reconnaissance
  3. Fingerprinting and enumeration
  4. Vulnerability assessment
  5. Exploit research and verification
  6. Reporting

Following such a checklist ensures that the penetration tester completes all tasks for a phase before moving onto the next. In this book, we started with the information-gathering phase and gradually moved on from there. The early chapters covered the early phases and taught you how to obtain sensitive details about a target, while the later chapters covered using the information found to gain access to a target using various methods.

In the next section, we will learn about the Open Web Application Security Project (OWASP) Top 10.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.170.183