Problem
1. Describe how tcpdump can identify vulnerabilities in web traffic.
2. Describe how skipfish can identify vulnerabilities in web traffic.
3. Summarize type of information identified by live http headers add on.
4. Describe how live http headers add on can identify vulnerabilities in web traffic.