Summary
In this chapter, we have explored some of the most common web application vulnerabilities plaguing cyber security. Attacks such as SQL injection, XSS, and username enumeration continue to be popular attack vectors for hackers to use. This chapter also provided two informative labs demonstrating Autopwn2 and BeEF. By completing the labs, you now have applied knowledge on how to use web app penetration tools to find vulnerabilities. The labs also showed how hackers may use the tools for recon and social engineering attacks. Towards the end of the chapter, we discussed different types of defenses that can be deployed against web application attacks. After reading this chapter, the user should have a much better understanding of what ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access