Client-side analysis
por Carlos Eduardo Leal de Sousa
1. Injections
1.1. Cross-site scripting (XSS)
1.1.1. Reflected
1.1.2. Stored
1.2. SQL Injection
1.2.1. SQLMap if necessary
1.2.1.1. Kali Linux
1.3. Blind SQL Injection
1.3.1. SQLMap if necessary
1.3.1.1. Kali Linux
1.4. Remote File Inclusion (RFI)
2. Manipulation
2.1. HTTP Request Manipulation
2.1.1. Burp Suite
2.2. Front-end Manipulation (HTML/JS,etc)
3. Footprint
3.1. Catching banners
4. Scans
4.1. Vulnerability
4.1.1. Uniscan
4.1.1.1. Kali Linux
4.1.2. VEGA
4.1.2.1. Kali Linux
4.1.3. Acunetix Trial
4.1.4. Another?