loading...

Discussion on: If you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

skydevht profile image
Holy-Elie Scaïde

I think that every hack out of there is the subversion of normal input. You're not creating a new entity, you just inserting something not expected which can trigger an abnormal response from an existing one.
I'm also a creator and the only things that were ever interesting for me in pen testing were reverse engineering and programming rootkits. Both because you have to set yourself to learning mode. It's like exploring those portions of the map where it's marked "Here be dragons".