Book Content
chapters • 9h52m total length
1. Setting it up
2. Reconaissance
3. Crawlers and spiders
4. Finding vulnerabilities
5. Automated scanners
6. Exploitation: Low hanging fruits
7. Exploitation: not so low
8. Man in the Middle
9. Client Side Attacks
10. Mitigation of OWASP Top 10














