Web Penetration Testing - Pentest Geek

Web Penetration Testing


Web Penetration Testing

Web Penetration Testing: What It Is

Web Penetration Testing is as the name suggestions, a penetration test that focuses solely on a web application rather than a network or company. The underlying concept and objectives for discovering security weakness and strengthening defense mechanisms are the same. In fact, a lot of the same tools and attack vectors are leveraged during the engagement. The key distinction is found in the methodology that web penetration testers use to footprint or map out a web applications functionality and then interrogate entry points (usually user supplied input fields).

Automated tools are absolutely necessary for this type of assessment however a detailed understanding of web-based client/server interaction is required to properly use most of the tools available.

Web Penetration Testing: What It Is Not

You may have heard someone refer to a Source Code Review as Web Penetration Testing. These two types of assessments, although security-driven, are very different and should not be lumped together. A source code review focuses on finding security weaknesses and best practice deficiencies directly at the source code layer. This type of engagement is typically performed on a pre-release timeframe. While web penetration testing targets a live application post-release.

Recommended Reading

We highly recommend you purchase The Web Application Hacker’s Handbook. This book covers every aspect of Burp Suite in much greater detail than this tutorial and should be considered an absolute MUST READ for any professional that is serious about Web Penetration Testing and ethical hacking.

As a reminder, Pentest Geek will receive a small commission if you purchase any of these titles by following the affiliate links on this page. Some additional titles you might consider include but are definitely not limited to:

Web Penetration Testing: Tools

Below are just a few of the tools commonly leveraged during a web penetration testing engagement.

Name Additional Information
Burp Suite https://www.pentestgeek.com/what-is-burpsuite
Samurai WTF http://samurai.inguardians.com/
Zed Attack Proxy https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Nikto2 https://cirt.net/Nikto2

Web Penetration Testing: Related Content

Below are some of Pentest Geek’s articles which feature Web Penetration Testing and are intended for educational purposes. If you desire a more complete understanding you might enjoy purchasing the Web Application hackers Handbook.

1 Comment
  • thanks :)

  • Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Share This

    Recent Posts

    Subscribe To Our Mailing List

    The Ultimate Burp Suite Training Program

    Learn Network Penetration Testing

    Penetration Testing

    Categories

    Metasploit

    Web Application Hacking


    Copyright 2024

    css.php

    FREE Burp Suite Training

    Take your web hacking skills to the next level.  Download a pre-configured virtual lab and start learning Burp Suite today!

    You have Successfully Subscribed!