Nmap, Masscan, Nikto, and enum4linux — systematic discovery of services, versions, and the exposure that turns a scan into a prioritized attack plan.
Nmap, Masscan, Nikto, and enum4linux — systematic discovery of services, versions, and the exposure that turns a scan into a prioritized attack plan.
Burp Suite intercepts HTTP/HTTPS traffic between your browser and the target. The Proxy tab captures requests you can modify and replay. The Repeater sends manual requests. The Scanner (Pro) automates vulnerability detection. The Intruder runs fuzzing attacks. Set your browser to use Burp as a proxy (127.0.0.1:8080) and install the Burp CA certificate to inspect HTTPS.
SQL injection exploits improper input sanitization to manipulate database queries. Test for it by injecting a single quote (') and observing errors. SQLmap automates detection and exploitation — it can dump databases, bypass authentication, and even get a shell if the DB user has FILE privileges. OWASP's DVWA and WebGoat provide safe practice targets.
XSS injects malicious scripts into pages viewed by other users. Reflected XSS returns your payload in the same request. Stored XSS persists in the database and affects every user who visits the page. DOM-based XSS manipulates client-side JavaScript. XSS can steal session cookies, redirect users, and perform actions on their behalf.
# SQLmap basic usage
sqlmap -u 'http://192.168.1.100/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit' \
--cookie='PHPSESSID=abc123; security=low' \
--dbs
# SQLmap dump a specific table
sqlmap -u '[url]' --cookie='[cookie]' -D dvwa -T users --dump
# XSS test payload
# <script>alert('XSS')</script>
# <img src=x onerror=alert(1)>
# Burp Suite CLI scanner (Pro)
java -jar burpsuite_pro.jar --project-file=scan.burp
# OWASP ZAP CLI alternative (free)
zap-cli --zap-path /usr/share/zaproxy quick-scan \
--self-contained --start-options '-config api.disablekey=true' \
http://192.168.1.100
Complete the OWASP WebGoat SQL Injection module and the XSS module. Screenshot all successful exploits and write a 2-sentence finding for each.
The foundations from today carry directly into Day 3. In the next session the focus shifts to Exploitation with Metasploit — building directly on everything covered here.
Before moving on, verify you can answer these without looking:
Live Bootcamp
Learn this in person — 2 days, 5 cities
Thu–Fri sessions in Denver, Los Angeles, New York, Chicago, and Dallas. $1,490 per seat. June–October 2026.
Reserve Your Seat →