In this chapter, we analyzed how to create our own extension and the different functions and methods provided by PortSwigger, which not only helped us to create a new extension but also showed us how to modify existing extensions that needed to be adapted to our requirements.
The next chapter looks at a real-world case of how a large online retailer was compromised by having its authentication implementation broken.