I hope that you liked this chapter. Most importantly, I hope that it will help you get your pen test tasks done quickly and efficiently. The workflow that I shared with you in this chapter is the secret sauce for your success; I use it during my own pen tests. I did my best to give you a checklist without nitty-gritty details, because you should've learned those at the beginning of this book (especially in Chapter 5, Understanding Web Application Vulnerabilities). I structured the book this way for a reason.
At this point, you've seen all of the activities for penetration testing, from Threat Modeling to Web Intrusion Testing. What's next? Now that you've seen it all, the next step is to learn how to automate penetration testing tasks by using the amazing programming language that is Python.