Table of Contents
- Introduction to Attacking Web Applications
- Efficient Discovery
- Low-hanging Fruit
- Advanced Bruteforcing
- File Inclusion Attacks
- Out of Band Exploitation
- Automated Testing
- Bad Serialization
- Practical Client-Side Attacks
- Practical Server-Side Attacks
- Attacking APIs
- Attacking CMS
- Breaking Containers

