Testing for Web Application Fingerprint IG-004.Identify application entry points IG-003.Search Engine Discovery/Reconnaissance IG-002. ![]() Sleep 5 sleep 5 || sleep 5 | sleep 5 & sleep 5 & sleep 5 Just some helpful regex terms to search for passively using Burpsuite or any other web proxy.Įn%0AContent-Length%3A%200%0A%0AHTTP%2F1.1%20200%20OK%0AContent-Type%3A%20text%2Fhtml%0AContent-Length%3A%2020%0A%3Chtml%3EINJECTX%3C%2Fhtml%3E%0A%0A Understand the function of the site, what types of data is stored or valuable and what sorts of functions to attack, etc.Enumerate all software technologies, HTTP methods, and potential attack vectors. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |