Compile a list containing every name and email address you can discover
relating to the target application and its development. This should include
any known developers, names found within HTML source code, names found
in the contact information section of the main company web site, and any
names disclosed within the application itself, such as administrative staff.
■
Using the search techniques described previously, search for each identi-
fied name, to find any questions and answers they have posted to Inter-
net forums. Review any information found for clues about functionality
or vulnerabilities within the target application.
74
Chapter 4
■
Mapping the Application
70779c04.qxd:WileyRed 9/14/07 3:12 PM Page 74
Do'stlaringiz bilan baham: |