Table of Contents
- Introduction to Penetration Testing and Web Applications
- Setting Up Your Lab with Kali Linux
- Reconnaissance and Profiling the Web Server
- Authentication and Session Management Flaws
- Attacking the Server Using Injection-based Flaws
- Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities
- Exploiting Cross Site Request Forgery
- Attacking Cryptographic implementation flaws
- AJAX, HTML5 and client side attacks
- Fuzzing Web Applications
- Using Automated Scanners on Web Applications

