Abstract: This article focuses on the knowledge of the technique Pentesting on web applications, discusses the different phases, most common of these attacks can be victims as well as upgrades ...