Book Content
chapters • 14h12m total length
1. Introduction to Penetration Testing and Web Applications
2. Setting Up Your Lab with Kali Linux
3. Reconnaissance and Profiling the Web Server
4. Authentication and Session Management Flaws
5. Attacking the Server Using Injection-based Flaws
6. Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities
7. Exploiting Cross Site Request Forgery
8. Attacking Cryptographic implementation flaws
9. AJAX, HTML5 and client side attacks
10. Fuzzing Web Applications
11. Using Automated Scanners on Web Applications














