Table of Contents
- Setting it up
- Reconaissance
- Crawlers and spiders
- Finding vulnerabilities
- Automated scanners
- Exploitation: Low hanging fruits
- Exploitation: not so low
- Man in the Middle
- Client Side Attacks
- Mitigation of OWASP Top 10

Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2