weaknesses of different tools, explain the extent to which any fully automated
tool can be effective in finding web application vulnerabilities, and provide
some tips and advice for getting the most out of your toolkit.
Chapter 20, “A Web Application Hacker’s Methodology,” contains a com-
prehensive and structured collation of all the procedures and techniques
described in this book. These are organized and ordered according to the logi-
cal dependencies between tasks when you are carrying out an actual attack. If
you have read and understood all of the vulnerabilities and techniques
described in this book, you can use this methodology as a complete checklist
and work plan when carrying out an attack against a web application.
Do'stlaringiz bilan baham: