"The art of web exploitation is to make the tools think the way you think."
In the previous chapters, we reviewed the attacker's kill chain–the specific approach used to compromise networks and devices, and disclose data or hinder access to network resources. In Chapter 5, Physical Attacks and Social Engineering, we examined the routes of attack, starting with physical attacks and social engineering. In Chapter 6, Wireless Attacks, we saw how wireless networks could be compromised. In this chapter, we'll focus on one of the most common attack routes, through websites and web-based applications.
Websites that deliver content and web-based services (for example, emails and FTP) are ubiquitous, and most organizations allow remote access to these services with almost constant availability. To penetration...