Table of Contents
- Common security protocols
- Performing Reconnaissance
- XSS
- CSRF/XSRF
- SQL Injection
- File Upload Issues
- Metasploit and Web
- XML attack vectors
- Emerging Attack Vectors
- OAuth 2.0 Security
- API Testing Methodology

Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!