James and I recorded the next episode of the Professionally Evil Perspective podcast this morning. In it we get back to walking through the methodology that we use during a web application penetration test. We had covered recon and mapping, so in this episode we go through the third step; discovery!
James and I discuss how discovery works, and how testers can become more efficient by building from the information they have gathered already. Discovery is built upon the map and recon gathered previously.
We also talk about Chris Eager’s winning entry into the SamuraiWTF contest and some upcoming events.
If you would like, you can subscribe via your favorite podcast applications or download it from http://secureideas.libsyn.com/pentesting-methodology-discovery
Kevin Johnson is the CEO of Secure Ideas. If you are in need of a penetration test or other security consulting services you can contact him at email@example.com or visit the Secure Ideas – Professionally Evil site for services provided.
Professionally Evil Insights Blog Post
Blogs by experts of penetration testing and other security assessments.
Secure Ideas believes that security is a team sport, and we are constantly striving to improve our skills and knowledge so that we can better protect our clients. We are also committed to sharing our expertise with the wider community through training, speaking engagements, and blog posts such as these.
For more information about the above topic, or other security questions, please Contact Us. We are happy to discuss your specific needs and how we can help you achieve your security goals.