This chapter contains the following recipes for performing web application vulnerability scanning:
- Web application scanning with Nikto
- SSL/TLS scanning with SSLScan
- SSL/TLS scanning with SSLyze
- GET method SQL injection with sqlmap
- POST method SQL injection with sqlmap
- Requesting a capture SQL injection with sqlmap
- Automating CSRF testing
- Validating command-injection vulnerabilities with HTTP traffic
- Validating command-injection vulnerabilities with ICMP traffic