17 results found (page 2 of 2)
http://2017.fossasia.org/schedule

…cess Recon --> mapping --> discovery --> exploitation testing tool e.g. -Nmap & Zenmap -Burpsuite -Cookies Manager+ -etc Verifying identified vulnerabilities by attacking and exploiting them •Go after the data or functionality that real attackers would go after •Successful exploi…