O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing by Robert W. Beggs

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Reconnaissance and Exploitation of Web-based Applications

In the previous chapters, we reviewed the attacker's kill chain—the specific approach used to compromise networks and devices, and disclose data or hinder access to network resources. In Chapter 7, Physical Attacks and Social Engineering, we examined the routes of attack, starting with physical attacks and social engineering. In Chapter 8, Exploiting Wireless Communications, we saw how wireless networks could be compromised. In this chapter, we'll focus on one of the most common attack routes, through websites and web-based applications.

Websites that deliver content and web-based services (for example, e-mails and FTP) are ubiquitous, and most organizations allow remote access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required