Active Web Application Enumeration

Popularity:

9

Simplicity:

5

Impact:

5

Risk Rating:

6

To extend or verify the information gleaned during the passive profiling stage, an attacker may then move on to performing active web application enumeration. This entails actually connecting to the organization's systems to gather information that is generally not available through Internet search engines. This allows an attacker to see exactly what attacks can be carried out against the organization's employees and systems.

Was this article helpful?

0 0
SEO Basics Tips For Small Business Owners

SEO Basics Tips For Small Business Owners

Whether you've created a website already or are planning to create one in the near future, you know that's only half the battle. The other half is getting your website found in the search engines in hopes of attracting those interested in the type of products or services you offer.

Get My Free Ebook


Post a comment