In this chapter, we took a look at some of the major tools used for web application testing and, by extension, cloud applications, as they are built on the same protocols and use many of the same platforms.
As you can tell, these vulnerabilities have a common root cause, that is, user input that is not sanitized or validated to ensure that the required data is being used for processing. Additionally, the exploitation of one vulnerability can allow for another to be exploited (directory traversal to file inclusion, as an example).
We looked at OWASP ZAP, Nikto, sqlmap, and Burp Suite to identify possible vulnerabilities, test for them, and exploit them. However, Kali comes with many other tools that can be used to do these tests and many can be used together.
Burp Suite and OWASP ZAP in particular are very powerful standalone tools that accomplish all that we've looked...