Elicitation - Information Gathering
Be it breaching physical infrastructure of an organization or be it breaching software security, one needs to cool with elicitation activity which speaks about information gathering from various sources.
Lost your password? Please enter your email address. You will receive a link to create a new password via email.
Be it breaching physical infrastructure of an organization or be it breaching software security, one needs to cool with elicitation activity which speaks about information gathering from various sources.
"A fool with a tool is still a fool", once you know what to do with the tool, then this list helps you. However, you can also do reverse engineering way of learning where you use the tool first and explore, and then you learn where it can help!
This checklist is going to help you kick-start security testing for web application from day 1.