O'Reilly logo

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by Mike Andrews, James A. Whittaker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2. Gathering Information on the Target

image

What’s In This Chapter?

This chapter presents three separate attacks designed to gather information about your Web application. These attacks are generally the starting point for any security testing that you might want to perform on your Web application. The information that you gather will help you perform some of the attacks in later chapters.

Introduction

War-time generals spend a great deal of time performing reconnaissance and gathering information on their adversary. They do this so they can decide how to use their offensive capability most effectively.

The same applies to software testing, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required