Computer Science, asked by sam0998, 3 months ago

what is pentesting ? how it works ?​

Answers

Answered by anupamsgpgi
2

Answer:

This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a target's vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause.

Answered by rkjais1980
1

Explanation:

..I HOPE IT'S CORRECT!!!

This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a target's vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause.

Similar questions