O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Web application analysis

Most applications developed today integrate different web technologies which increase the complexity and risk to expose sensitive data. Web applications have always been a long-standing target for malicious adversaries to steal, manipulate, sabotage, and extort the corporate business. This proliferation of web applications has put enormous challenges for penetration testers. The key is to secure both web applications (frontend) and databases (backend) on the top of network security countermeasures. It is quite necessary because web applications act as a data processing system and the database is responsible for storing sensitive data (for example, credit cards, customer details, authentication data, and so on). In this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required