Web applications are the most targeted methods of compromise. Today, we have web applications that provide e-commerce services, a prized target for attackers since they can obtain details such as credit cards and personal identifiable information. Businesses that have an internet presence are bound to have a web application that is accessible by the public. Web penetration testing demands both skill and time, and understanding the components of a web application, the types of attacks, and the tools that can be used will help you to focus on the exploitable vulnerabilities within a short time frame.
In this chapter, you will learn about web applications and their components. You will learn about the different types of web application security testing and how penetration testing fits in. You will also understand the basics of the HTTP protocol and how...