W
“Walking the stack,” enterprise applications
296WAN
Web applications
basic approach
221–224basic assessment
231–233command execution attacks
231–232core technologies
224–233cross-site scripting attacks
233database query injection attacks
232directory traversal attacks
231DVWA
22vs. enterprise applications
292file system attacks
231hands-on challenge
255–256impersonation attacks
233information gathering attacks
231isolated test lab ...
Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.