From the course: CompTIA PenTest (PT0-002) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Application and open-source resources

Application and open-source resources

From the course: CompTIA PenTest (PT0-002) Cert Prep

Application and open-source resources

- Penetration testing is a lot like peeling an onion. You go layer by layer and you get closer and closer in, and sometimes you end up crying. But it's a fun process in the process. And what we're going to be doing now is kind of just peeling one more layer of that onion. We've started off planning, we've now gotten a little bit of an idea of what's out there, the different targets we may want to start attacking or at least working toward the attacks. And now, we need to learn more about these targets and try to figure out how we can find some of their soft spots, look for the vulnerabilities. So let's peel away one more layer of the onion, and let's take a look at one particular type of attack or rather type of target. What if the target is an application? What are the things we can do to help target an application and find its soft spots? Well, first off, we can attempt to take an executable and turn it back into source code. That's called decompilation. So let's back up for a…

Contents