Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
Service-Oriented Architecture ◾  169
that can be leveraged to parse and test web services. One of the most useful tools is WS Digger by
McAfee Foundstone. You simply load the URL for the WSDL into the tool (Figure 13.5). Simply
selecting the service you wish to exploit will provide details on these data expected and will allow
for manual testing of the service’s response to the data (Figure 13.6). WS Digger provides the vul-
nerability analyst or penetration tester with not only the ability to parse out any control, but also
to feed the tool with input data for testing.
WSKnight is another WSDL enumeration tool that can make finding vulnerabil ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498