Chapter 3. Vulnerability Assessment
In this chapter, we will cover the following recipes:
- Using the infamous Burp
- Exploiting WSDLs with Wsdler
- Using Intruder
- Web app pentest with Vega
- Exploring SearchSploit
- Exploiting routers with RouterSploit
- Using Metasploit
- Automating Metasploit
- Writing a custom resource script
- Databases in Metasploit