Book Content
chapters • 13h28m total length
1. Setting up Kali Linux and the Testing Lab
2. Reconnaissance
3. Using Proxies, Crawlers and Spiders
4. Testing Authentication and Session Management
5. Cross-Site Scripting and Client-Side Attacks
6. Exploiting Injection Vulnerabilities
7. Exploiting Platform Vulnerabilities
8. Using Automated Scanners
9. Bypassing Basic Security Controls
10. Mitigation of OWASP Top 10 Vulnerabilities














