Web Site Security and Pen testing – overtly and covertly
I wanted to start a web site security chat.
I would say this would be a staged information flow.
We have all done those hack the web site challenge and some of us have completed this.
And it is now time to talk about the methods and applications, from hiding your identity while applying the pen test.
The point of this is to get some sort of process.
1. Picking the right connection and hardware for your Pen test.
2. Hiding your identity
3. surveying the target
3.?
4.?
5? etc
I will add new ones when we have discussed the first topic
Picking the right connection and hardware for your Pen test.
I will try and add information on this subject tonight, but if anyone wants to start – If I see threads that are a waste of time and have no content information, they will be deleted.
Social Networking Bookmarks