Packt Publishing – Pentesting Web Applications
English | Size: 565.46 MB
Penetration testing is not only about networks but also web applications.
Begin your journey by familiarizing yourself with the well-known tools to perform vulnerability assessment. Take a deep dive into understanding Metasploit Framework and learn how to maintain access on the target machine, when successfully exploited. Documentation is always essential and so is creating an effective report for submission to the customer. You will learn what to include in reports.
Finally, you will be all set to perform penetration testing in a real-time scenario, and will try to crack a challenge, summing up everything you have learnt so far and apply it in real-time.
What You Will Learn
Scan web applications to look for security vulnerabilities
Take a detailed walk-through of Burpsuite and understand a few Burp tools
Get familiar with the Post-exploitation attacks on Windows and Linux to maintain access on the target
Create easy to follow reports with precise information and detailed findings
Assembling the pieces, take up a challenge in exploiting a real time network and see how everything connects
If any links die or problem unrar, send request to goo.gl/aUHSZc