Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps.
Summary
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more.