Book Content
chapters • 8h20m total length
1. Joining the Hunt
2. Choosing Your Hunting Ground
3. Preparing for an Engagement
4. Unsanitized Data; An XSS Case Study
5. SQL, Code Injection, and Scanners
6. CSRF and Insecure Session Authentication
7. Detecting XML External Entities
8. Access Control and Security Through Obscurity
9. Framework and Application-Specific Vulnerabilities
10. Formatting Your Report
11. Other Tools
12. Other (Out of Scope) Vulnerabilities
13. Going Further
14. Assessment














