Chapter 8. Enterprise application testing
Information in this chapter
• Objective
• Core Technologies
• Approach
• Open Source Tools
• Case Study: The Tools in Action
• Hands-On Challenge
Enterprise applications generally consist of a stack of supporting technologies including the core server hardware, operating system, database, and application software, with the application itself split across numerous layers linked together via networking equipment. Therefore, performing penetration testing on an enterprise application means determining how to compromise one or more levels of the application stack. To do this, penetration testers must use all the techniques and tools discussed in this book thus far, along with a few new enterprise application specific ...

Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.