Active Web Application Enumeration

Popularity:

9

Simplicity:

5

Impact:

5

Risk Rating:

6

To extend or verify the information gleaned during the passive profiling stage, an attacker may then move on to performing active web application enumeration. This entails actually connecting to the organization's systems to gather information that is generally not available through Internet search engines. This allows an attacker to see exactly what attacks can be carried out against the organization's employees and systems.

Was this article helpful?

0 0
Super SEO GuideBook

Super SEO GuideBook

This course covers everything that you could ever want toknow about getting high rankings in the search engines. Many courses only give you a little bit of information and then try to sell you additional courses with the real secrets in them. Youll never have to worry about that with this course.

Get My Free Ebook


Post a comment