Chapter 6. Web Application Vulnerability Assessment
In this chapter, we will cover the following recipes:
- Running vulnerable web applications in Docker
- Using w3af for vulnerability assessment
- Using Nikto for web server assessment
- Using Skipfish for vulnerability assessment
- Using Burp Proxy to intercept HTTP traffic
- Using Burp Intruder for customized attack automation
- Using Burp Sequencer to check the session randomness