Skip to Main Content
Penetration Tester's Open Source Toolkit, 3rd Edition
book

Penetration Tester's Open Source Toolkit, 3rd Edition

by Jeremy Faircloth
August 2011
Intermediate to advanced content levelIntermediate to advanced
464 pages
12h 57m
English
Syngress
Content preview from Penetration Tester's Open Source Toolkit, 3rd Edition
Chapter 8. Enterprise application testing
Information in this chapter
• Objective
• Core Technologies
• Approach
• Open Source Tools
• Case Study: The Tools in Action
• Hands-On Challenge
Enterprise applications generally consist of a stack of supporting technologies including the core server hardware, operating system, database, and application software, with the application itself split across numerous layers linked together via networking equipment. Therefore, performing penetration testing on an enterprise application means determining how to compromise one or more levels of the application stack. To do this, penetration testers must use all the techniques and tools discussed in this book thus far, along with a few new enterprise application specific ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Tester's Open Source Toolkit, 2nd Edition

Penetration Tester's Open Source Toolkit, 2nd Edition

Chris Hurley, Jeremy Faircloth

Publisher Resources

ISBN: 9781597496278