-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Kali Linux Cookbook - Third Edition
By :
The web is the most exposed surface of any organization. Public websites, content management systems (CMSs), API endpoints, and backend databases – these exposed services are constant targets for attackers seeking to steal data, deface content, or gain a foothold into deeper systems. As a penetration tester, understanding how to analyze and exploit these components is critical to uncovering security flaws that can be taken advantage of.
In this chapter, you’ll conduct reconnaissance to uncover web technologies, fingerprint CMS platforms, and identify common misconfigurations and outdated software. Then, you’ll escalate your efforts with tools that scan for vulnerabilities, exploit command injection points, and pull sensitive data through SQL injection. Each recipe walks you through practical scenarios.
The following recipes will be covered in this chapter: