Page 175 - Hands-On Bug Hunting for Penetration Testers
P. 175

Framework and Application-Specific Vulnerabilities                          Chapter 9

            Questions


                   1.  What does CVE stand for? What is it?
                   2.  What makes WordPress such an attractive target for hackers?
                   3.  What are the advantages of using a CLI versus Burp extension for your WPScan
                      functionality? How about vice versa?
                   4.  What are some good methods for finding Ruby on Rails-specific bugs?
                   5.  What are some advantages to using Docker for your pentesting tools?
                   6.  What does OVAL stand for? What is an OVAL definition?
                   7.  What are some issues that you should be on the lookout for when testing a
                      Django application?



            Further Reading


            You can find out more about some of the topics we have discussed in this chapter at:
                      WordPress Official Site: IUUQT   XPSEQSFTT PSH
                      CVE FAQ: IUUQT   DWF NJUSF PSH BCPVU GBRT IUNM.
                      OVAL Home page: IUUQT   PWBM NJUSF PSH SFQPTJUPSZ BCPVU PWFSWJFX
                      IUNM.
                      WPScan Home page: IUUQT   XQTDBO PSH .
                      OWASP Ruby on Rails Cheatsheet: IUUQT   XXX PXBTQ PSH JOEFY QIQ 3VCZ@
                      PO@3BJMT@$IFBUTIFFU.
                      The Official Rails Security Guide: IUUQT   HVJEFT SVCZPOSBJMT PSH
                      TFDVSJUZ IUNM.





















                                                    [ 160 ]
   170   171   172   173   174   175   176   177   178   179   180