INTRODUCCIÓN
MÉTODOS DE ANÁLISIS DE APLICACIONES WEB
Network Mapping
Information Gathering
CMS Identification
IDS/IPS Detection
Open Source Analysis
Web Crawlers
Vulnerability Assessment and Exploitation
Maintaining Access
NETWORK MAPPING
Nmap
Netifera
INFORMATION GATHERING
TheHarvester
Maltego
CMS IDENTIFICATION
BlindElephant
CMS-Explorer
WhatWeb
IDS/IPS DETECTION
Waffit
OPEN SOURCE ANALYSIS
GHDB (Google Hacking DataBase)
Xssed
WEB CRAWLERS
WebShag
DirBuster
VULNERABILITY ASSESSMENT AND EXPLOITATION
JoomScan
SqlMap
Fimap
Shodan
W3af
Uniscan
Nikto
MAINTAINING ACCESS
Weevely
WeBaCoo
MsfPayload
CONCLUSIÓN
DOWNLOAD
VER ONLINE
Excelente Paper, Felicitaciones.
ResponderEliminarBueniiiiiisimooooo, pedazo de paper, ya estoy leyendoo jeje
ResponderEliminarSigue asi que nos ayudas a muchos ;)
Salu2
Muchas gracias, gran paper¡¡ :)
ResponderEliminarENGLISH PLZZ
ResponderEliminarYou want to do penetration testing, but you are incapable of using a translation app? You must be American.
EliminarThe blog has an option to place the post in any language.
EliminarEl link directo al PDF (http://www.exploit-db.com/wp-content/themes/exploit/docs/22954.pdf) no sirve. Ni llega un ping al domain. Sera que alguien haya hackeado el servidor? :/
ResponderEliminar