Chapter 4. Finding Vulnerabilities
In this chapter, we will cover:
- Using Hackbar add-on to ease parameter probing
- Using Tamper Data add-on to intercept and modify requests
- Using ZAP to view and alter requests
- Using Burp Suite to view and alter requests
- Identifying cross site scripting (XSS) vulnerabilities
- Identifying error based SQL injection
- Identifying blind SQL Injection
- Identifying vulnerabilities in cookies
- Obtaining SSL and TLS information with SSLScan
- Looking for file inclusions
- Identifying POODLE vulnerability