Introduction
We have now finished the reconnaissance stage of our penetration test and have identified the kind of server and development framework our application uses and also some of its possible weak spots. It is now time to actually put the application to test and detect the vulnerabilities it has.
In this chapter, we will cover the procedures to detect some of the most common vulnerabilities in web applications and the tools that allow us to discover and exploit them.
We will also be working with applications in vulnerable_vm and will use OWASP Mantra, as the web browser to perform the tests.