Usually when a test is performed penetration
testers use manual skills to
pitch a report of the attack. It is always best to do a manual report because
in no way a machine can think about the effect of this vulnerability to the
organization in a humane way. However, it is
time-saving to use inbuilt
features in the web application interception
software to report the pen
testing reports.
By this, we have completed a detailed explanation about how hackers work
and even given a checklist of things that need to be done by or testers. In
the next chapter, we will have a detailed introduction to web hacking and
some of its tools. From the next chapter, we will be dealing with practical
things so get ready to have fun with hacking. Let's go!