O'Reilly logo

Kali Linux Cookbook by David De Smet, Willie L. Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking WordPress and other applications

More and more businesses today utilize SAAS (Software as a Service) tools in their daily business. For example, it is not uncommon for a business to use WordPress as its website's content management system or Drupal for its intranet. Being able to locate vulnerabilities in these applications can prove extremely valuable.

One great resource for gathering applications to test against is Turnkey Linux (http://www.turnkeylinux.org). In this recipe, we will download the popular WordPress Turnkey Linux distribution.

Getting ready

A connection to the Internet or an internal network is required to complete this module.

How to do it...

The steps for attacking a WordPress application are as follows:

  1. Open your web browser ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required