1. Introduction 1.1. Just_the_graphical_interface 1.2. Running_the_program 2. General_structure 2.1. The_toolbar 3. Scanning 3.1. Configuring_the_scan 3.2. Using_the_Profiles 3.3. Running_the_scan 4. Analyzing_the_results 4.1. Browsing_the_Knowledge_Base 4.2. Site_structure 4.3. Requests_and_Responses 5. Exploitation 5.1. Executing_an_exploit 5.2. Using_a_shell 6. Other_tools 6.1. Manual_Requests 6.2. Fuzzy_Requests ClusterResponseTool 6.3. Encode_and_Decode 6.4. Comparing_HTTP_traffic 6.5. Using_the_Proxy 6.6. Wizards 7. Configurations 7.1. HTTP_Configuration 7.2. Miscellaneous_Configuration 7.3. Advanced_target 7.4. Proxy_Configuration