Penetration Testing Guide
Home
Getting Started
Tools
Testing
Web
Information Gathering
Configuration and Deploy Management
Identity Management
Authentication
Authorization
Session Management
Data Validation
Error Handling
Cryptography
Business Logic
Client Side
Mobile
Reverse Engineering
Published with MkDocs
Theme by GitBook
Information Gathering
Conduct Search Engine Discovery and Reconnaissance for Information Leakage
Reference
theharvester
Fingerprint Web Server
Check the
Server
header in the response.
Review Webserver Metafiles for Information Leakage
Enumerate Applications on Webserver
Review Webpage Comments and Metadata for Information Leakage
Identify application entry points
Map execution paths through application
Fingerprint Web Application Framework
Fingerprint Web Application
Map Application Architecture