Further reading
To learn more about what was covered in this chapter, take a look at the following resources:
- Web application vulnerability scanners: https://hub.packtpub.com/implementing-web-application-vulnerability-scanners-with-kali-linux-tutorial/
- Secure web-based applications: https://hub.packtpub.com/why-secure-web-based-applications-with-kali-linux/