O'Reilly logo

Web Hacking: Attacks and Defense by Shreeraj Shah, Saumil Shah, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Web Hacking: Automated Tools

 

But don't despise error. When touched by genius, when led by chance, the most superior truth can come into being from even the most foolish error. The important inventions. which have been brought about in every realm of science from false hypotheses number in the hundreds, indeed in the thousands.

 
 --Stefan Zweig, Austrian writer

Introduction

Most of the information provided in this book up to this point has been manual, step-by-step procedures for finding vulnerabilities in Web applications and fixing them. However, many automated tools can perform nearly the same functions, at ten times the speed and a hundredth of the headache.

We've already discussed (or mentioned in passing) a few of these tools in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required