Having completed this chapter, you are now able to perform web application penetration testing, bypass login using SQL injection attacks, find tables in databases and retrieve user credentials, perform various types of XSS attacks on web applications, and successfully launch client-side attacks using BeEF.
I hope this chapter will prove helpful to your studies and career. In the next chapter, you'll be learning about penetration testing best practices.