-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Attacking and Exploiting Modern Web Applications
By :

This section describes our working tools, focusing first on the operating system and tools that underlie our work.
To test, attack, and exploit web applications, we will most likely use the HTTP and HTTPS protocols, and so we must equip ourselves to analyze this type of traffic according to the scheme depicted in the following figure:
Figure 2.1 – A tester’s machine
We use our browser, or other tools, connected to our proxy to intercept traffic and connect to our target. This basic setup allows us to adapt to operational needs and personal preferences.
We then proceed to choose the following:
We need to choose our operating system wisely, especially our host operating system. It must be an operating...