1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00

GitBook: [master] one page modified

This commit is contained in:
CPol 2020-12-31 01:30:52 +00:00 committed by gitbook-bot
parent d7ec065283
commit 35e41d4c66
No known key found for this signature in database
GPG key ID: 07D2180C7B12D0FF

View file

@ -320,6 +320,8 @@ Now that we have built the list of assets of our scope it's time to search for s
* extension:js jsforce conn.login
* extension:json googleusercontent client\_secret
You can also search for leaked secrets in all open repository platforms using: [https://searchcode.com/?q=auth\_key](https://searchcode.com/?q=auth_key)
## [**Pentesting Web Methodology**](pentesting/pentesting-web/)\*\*\*\*
Anyway, the **majority of the vulnerabilities** found by bug hunters resides inside **web applications**, so at this point I would like to talk about a **web application testing methodology**, and you can [**find this information here**](pentesting/pentesting-web/).