Summary

In this chapter, we learned about the different authentication methods commonly used in web applications, and we created one tool to test basic and digest authentication. Finally, we created a login form authentication BruteForcer.

In Chapter 6, Detecting and Exploiting SQL Injection Vulnerabilitieswe're going to learn about detecting and exploiting SQL injection vulnerabilities.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.243.184