Ch 4: Web Attacks!

Now that we have done a simple SQL injection attack, let’s take a deeper dive into one of the tools that an actual hacker (or Red Team) might actually use to attack an application.