Book Image

Pentesting Web Applications [Video]

By : Tajinder Kalsi
Book Image

Pentesting Web Applications [Video]

By: Tajinder Kalsi

Overview of this book

Penetration testing is not only about networks but also web applications. Begin your journey by familiarizing yourself with the well-known tools to perform vulnerability assessment. Take a deep dive into understanding Metasploit Framework and learn how to maintain access on the target machine, when successfully exploited. Documentation is always essential and so is creating an effective report for submission to the customer. You will learn what to include in reports. Finally, you will be all set to perform penetration testing in a real-time scenario, and will try to crack a challenge, summing up everything you have learnt so far and apply it in real-time.
Table of Contents (4 chapters)
Chapter 3
Documenting and Reporting
Content Locked
Section 1
Executive Summary
While preparing the report to be presented to the client or management, it’s essential to remember that they may not be as technical as us. So, the report needs to be easy to understand for them and should contain the data which is relevant to them. The aim of this video is to discuss about how to prepare the Executive summary section of the report, which will serve the purpose. - Include the Scope of work in executive summary - Mention the assumptions and criteria of findings - Include summary of findings and recommendations alongwith representations