Using your knowledge of OWASP and penetration testing for Web servers and Web applications, describe your approach to performing an intrusive penetration test on a production Web server and Web application with a back-end SQL database.
Apply the 5-step hacking process to this penetration test for Web server and Web application with back-end SQL database.