Category: Security Planning
-
Common Attack Vectors
SQL Injection Structured Query Language (SQL) injection is a common method of taking advantage of websites that depend on databases to serve their users. Clients are computers that get information from servers, and an SQL attack uses an SQL query sent from the client to a database on the server. The command is inserted, or…
-
Penetration Testing Phases
Phase 1: Pre-Engagement Preparing and planning which tools and scripts to use. Agreeing to what type of testing will occur (White, Black, or Gray Box) as well as defining the scope of engagement. Document a contract in writing that explains the goal, expectations, and risk of the testing. Phase 2: Reconnaissance Through the use of…