| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Tools for conducting application penetration tests have become increasingly advanced over the past decade. Yet with all this focus on bigger, badder and more specialized tools, it seems we,ve lost sight of the most effective tool in our arsenal, our own eyes. Performing reconnaissance on target applications is one of those concepts that many know exists but few seem to actually employ as part of an application penetration test.
In this presentation, we,ll discuss how intelligence gathering can not only improve application assessments but in many cases can be the difference between a sparse report and pwn,ing the app. We,ll look at some common and some less than common methods for gathering intelligence on your target application. We,ll see some examples of how good reconnaissance techniques turned seemingly trivial applications into smoking piles of wreckage that left their owners dazed and confused.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast