Preface

It was just another day at work, as usual we were supposed to configure some scans, validate some results, and perform some manual tests. We have been working with our team on some pentesting projects. Unlike many other jobs pentesting is not that boring, honestly who doesn’t enjoy finding flaws in someone’s work and get paid for it. So following the process we did some recon and found some interesting information about the target. We started digging deeper and soon we had enough information to compromise the target. We finished the rest of the process and send out the reports to the clients, who were more than happy with the results.
Later that evening we were discussing about the tests and realized that most of the information, which ...

Get Hacking Web Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.