O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Web Application Vulnerability Assessment

In this chapter, we will cover the following recipes:

  • Running vulnerable web applications in Docker
  • Using w3af for vulnerability assessment
  • Using Nikto for web server assessment
  • Using Skipfish for vulnerability assessment
  • Using Burp Proxy to intercept HTTP traffic
  • Using Burp Intruder for customized attack automation
  • Using Burp Sequencer to check the session randomness

Introduction

A vulnerability assessment phase is the process of finding vulnerabilities on target machines.

Performing vulnerability assessment simultaneously on web applications and the network together can be more useful as you will correlate different vulnerabilities and information gathered from network infrastructure and other protocols, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required