Web application analysis

Most applications that are developed these days integrate different web technologies, which increases the complexity and risk of exposing sensitive data. Web applications have always been a long-standing target for malicious adversaries to steal, manipulate, sabotage, and extort the corporate business. This proliferation of web applications has put forth enormous challenges for penetration testers. The key is to secure both web applications (front-end) and databases (back-end) on top of the network security countermeasures. This is necessary because web applications act as a data-processing system and the database is responsible for storing sensitive data (for example, credit cards, customer details, authentication data, ...

Get Kali Linux – Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.