1. Web Servers
2. Classification of Web Attacks
3. Reflected Cross-Site Scripting Attacks
4. Reflected Cross-Site Scripting over JSON
5. Stored Cross-Site Scripting Attacks
6. DOM Based Cross-Site Scripting Attacks
7. Inband SQL Injection over a Search Form
8. Inband SQL Injection over a Select Form
9. Error-Based SQL Injection over a Login Form
10. SQL Injection over Insert Statement
11. Boolean Based Blind SQL Injection
12. Time Based Blind SQL Injection
13. Detecting and Exploiting SQL Injection with SQLmap
14. Detecting and Exploiting Error Based SQL Injection with SQLmap
15. Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap
16. Command Injection Introduction
17. Automate Command Injection Attacks Commix
18. XMLXPATH Injection
19. SMTP Mail Header Injection
20. PHP Code Injection
21. Zed Attack Proxy (ZAP) A Web App Vulnerability Scanner
22. Path Traversal File