In Chapter 6, Vulnerability Scanning, we looked at performing vulnerability scanning using Nessus and OpenVAS, two very powerful tools. In this chapter, we will be taking a look at tools specifically for web and web application scanning and attacking.
Most applications that are developed these days integrate different web technologies. This increases the complexity and risk of exposing sensitive data. Web applications have always been a long-standing target for malicious adversaries to steal, manipulate, sabotage, and extort corporate businesses. This proliferation of web applications has brought forth enormous challenges for pentesters. The key is to secure a web application's frontend, its backend usually consists of databases, any additional microservices, and the overall network security. This is necessary because web applications act as a data...