Table of Contents
- Introduction to Web Application Penetration Testing
- Metasploit Essentials
- The Metasploit Web Interface
- Using Metasploit for Reconnaissance
- Web Application Enumeration using Metasploit
- Vulnerability scanning using WMAP
- Vulnerability Assessment using Metasploit (Nessus)
- Pentesting CMSes
- Pentesting CMSes
- Pentesting CMSes
- Penetration Testing on Technological Platforms
- Penetration Testing on Technological Platforms
- Penetration Testing on Technological Platforms
- Web Application Fuzzing
- Writing Penetration Testing Reports

