Web Application Vulnerabilities - Detect, Exploit, Prevent [PDF]
Web Application Vulnerabilities: Detect, Exploit, Prevent
�Web Application Vulnerabilities: Detect, Exploit, Prevent�
Syngress | 2007 | ISBN: 1597492094
9781597492096 9780080556642 | 476 pages | PDF | 17 MB
This book describes how to make a computer bend to your will by finding
and exploiting vulnerabilities specifically in Web applications. The
book describes common security issues in Web applications, tells you how
to find them, describes how to exploit them, and then tells you how to
fix them.
The book covers how and why some hackers (the bad guys) will try to
exploit these vulnerabilities to achieve their own end. Author explains
how to detect if hackers are actively trying to exploit vulnerabilities
in your own Web applications.
� Learn to defend Web-based applications developed with AJAX, SOAP,
XMLPRC, and more.
� See why Cross Site Scripting attacks can be so devastating.
Contents
Chapter 1 : Introduction to Web Application Hacking
Introduction
Web Application Architecture Components
Complex Web Application Software Components
Putting it all Together
The Web Application Hacking Methodology
The History of Web Application Hacking and the Evolution of Tools
Summary
Chapter 2 : Information Gathering Techniques
Introduction
The Principles of Automating Searches
Applications of Data Mining
Collecting Search Terms
Summary
Chapter 3 : Introduction to Server Side Input Validation Issues
Introduction
Cross Site Scripting (XSS)
Chapter 4 : Client-Side Exploit Frameworks
Introduction
AttackAPI
BeEF
CAL9000
Overview of XSS-Proxy
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5 : Web-Based Malware
Introduction
Attacks on the Web
Hacking into Web Sites
Index Hijacking
DNS Poisoning (Pharming)
Malware and the Web: What, Where, and How to Scan
Parsing and Emulating HTML
Browser Vulnerabilities
Testing HTTP-scanning Solutions
Tangled Legal Web
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6 : Web Server and Web Application Testing with BackTrack
Objectives
Introduction
Approach
Core Technologies
Open Source Tools
Case Studies: The Tools in Action
Chapter 7 : Securing Web Based Services
Introduction
Web Security
Instant Messaging
Web-based Vulnerabilities
Buffer Overflows
Making Browsers and E-mail Clients More Secure
Securing Web Browser Software
CGI
Break-ins Resulting from Weak CGI Scripts
FTP Security
Directory Services and LDAP Security
Summary
Solutions Fast Track
Frequently Asked Questions
Index
Web Application Vulnerabilities: Detect, Exploit, Prevent
[Download]
[Download]
0 comments:
Never Forget To Say Thanks :D