What this book covers
Chapter 1, Gathering Open Source Intelligence, covers a set of recipes for collecting information from freely available sources.
Chapter 2, Enumeration, guides you through creating scripts to retrieve the target information from websites and validating potential credentials.
Chapter 3, Vulnerability Identification, covers recipes based on identifying potential vulnerabilities on websites, such as Cross-site scripting, SQL Injection, and outdated plugins.
Chapter 4, SQL Injection, covers how to create scripts that target everyone's favorite web application vulnerability.
Chapter 5, Web Header Manipulation, covers scripts that focus specifically on the collection, control, and alteration of headers on web applications.
Chapter 6, Image Analysis and Manipulation, covers recipes designed to identify, reverse, and replicate steganography in images.
Chapter 7, Encryption and Encoding, covers scripts that dip their toes into the massive lake that is encryption.
Chapter 8, Payloads and Shells, covers a small set of proof of concept C2 channels, basic post-exploitation scripts, and on server enumeration tools.
Chapter 9, Reporting, covers scripts that focus to make the reporting of vulnerabilities easier and a less painful process.