Chapter 4. Finding Vulnerabilities
In this chapter, we will cover:
Using Hackbar add-on to ease parameter probing
Using Tamper Data add-on to intercept and modify requests
Using ZAP to view and alter requests
Using Burp Suite to view and alter requests
Identifying cross site scripting (XSS) vulnerabilities
Identifying error based SQL injection
Identifying blind SQL Injection
Identifying vulnerabilities in cookies
Obtaining SSL and TLS information with SSLScan
Looking for file inclusions
Identifying POODLE vulnerability