Summary
We have reached the end of this exciting and extensive chapter, undoubtedly the most technical, in which you, the reader, have acquired some knowledge and learned a lot about advanced vulnerability search techniques.
We began with a brief review of basic vulnerability search techniques, then I showed you that not all vulnerabilities require complex searches; sometimes it’s equally important to identify weaknesses resulting from human errors. From there on, we discussed advanced enumeration, code injection, and privilege escalation.
Finally, we finished by talking briefly about a world as advanced and complex, as well as exciting, as reverse engineering. And finally, we told the reader about searching for vulnerabilities in mobile devices.
See you in the next chapter, which is based on learning how to prepare and present quality reports.