The automated tools discussed in this chapter allow you perform many of the hacking techniques used to assess the security of a Web application. They make much easier what was once a tedious manual process. You can then take steps to strengthen the security of your system and Web site by following the recommendations presented.