In this chapter, we learned about the different authentication methods commonly used in web applications, and we created one tool to test basic and digest authentication. Finally, we created a login form authentication BruteForcer.
In Chapter 6, Detecting and Exploiting SQL Injection Vulnerabilities, we're going to learn about detecting and exploiting SQL injection vulnerabilities.