Summary
In this chapter, you learned about crawling AJAX applications. We then moved on to reviewing the changes that HTML5 poses to penetration testers in terms of new functionality and new attack vectors. Then, we reviewed some techniques that let you bypass security controls implemented on the client-side. In the final section, we reviewed some key issues to take into account in order to prevent AJAX, HTML5, and client-side vulnerabilities.
In the next chapter, you will learn about more everyday security flaws in web applications.