Flylib.com
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
ISBN: 0071740643
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
Joel Scambray
,
Vincent Liu
,
Caleb Sima
BUY ON AMAZON
Hacking Exposed Web Applications, Second Edition
Back Cover
About
Foreword
Introduction
How This Book Is Organized
Online Resources And Tools
A Final Word To Our Readers
Chapter 1: Hacking Web Apps 101
Resources
References And Further Reading
Summary
How Are Web APPS Attacked?
Who, When, And Where?
Why Attack Web Applications?
Chapter 2: Profiling
Infrastructure Profiling
References And Further Reading
Summary
General Countermeasures
Application Profiling
Chapter 3: Hacking Web Platforms
Point-And-Click Exploitation Using Metasploit
References And Further Reading
Summary
Web Platform Security Best Practices
Evading Detection
Manual Exploitation
Chapter 4: Web Authentication Attacking
Bypassing Authentication
Some Final Thoughts: Identity Theft
Summary
References And Further Reading
Chapter 5: Attacking Web Authorization
Fingerprinting Authz
Attacking Acls
Attacking Tokens
Authorization Attack Case Studies
Authorization Best Practices
Summary
References And Further Reading
Chapter 6: Input Validation Attacks
Expect The Unexpected
Where To Find Attack Vectors
Bypass Client-Side Validation Routines
Common Input Validation Attacks
Summary
References And Further Reading
Chapter 7: Attacking Web Datastores
SQL Primer
SQL Injection Discovery
Exploit SQL Injection Vulnerabilities
Other Datastore Attacks
Summary
Chapter 8: Attacking XML Web Services
What Is A Web Service?
Attacking Web Services
Web Service Security Basics
Summary
References And Further Reading
Chapter 9: Attacking Web Application Management
Remote Server Management
Web Content Management
Admin Misconfigurations
Developer-Driven Mistakes
Summary
References And Further Reading
Chapter 10: Hacking Web Clients
Exploits
Trickery
General Countermeasures
Summary
References And Further Reading
Chapter 11: Denial-of-Service (DoS) Attacks
Common Dos Attack Techniques
General Dos Countermeasures
Summary
References And Further Reading
Chapter 12: Full-Knowledge Analysis
Threat Modeling
Rank The Threats
Code Review
Security Testing Of Web App Code
Security In The Web Development Process
Summary
References And Further Reading
Chapter 13: Web Application Security Scanners
Technology: Web App Security Scanners
Nontechnical Issues
Summary
References And Further Reading
Appendix A: Web Application Security Checklist
Appendix B: Web Hacking Tools and Techniques Cribsheet
Appendix C: URLScan and ModSecurity
Urlscan
Modsecurity
Summary
References And Further Reading
Appendix D: About the Companion Web Site
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
List of Figures
List of Tables
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
ISBN: 0071740643
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
Joel Scambray
,
Vincent Liu
,
Caleb Sima
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Making Programs Think Branching Statements and Subroutines
Number Crunching Mathematical and Relational Operators and Commands
Basic Graphics Commands
Fundamentals of 3D Graphics Programming
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Challenging the Unpredictable: Changeable Order Management Systems
Distributed Data Warehouse for Geo-spatial Services
Healthcare Information: From Administrative to Practice Databases
Development of Interactive Web Sites to Enhance Police/Community Relations
Metrics and Models in Software Quality Engineering (2nd Edition)
Software Development Process Models
Software Quality Metrics Overview
Examples of Metrics Programs
Relations Diagram
Customer Satisfaction Surveys
An Introduction to Design Patterns in C++ with Qt 4
Setup: Open-Source Platforms
Inline Functions
Review Questions
Table Models
Introduction to MySQL
Twisted Network Programming Essentials
Installing from Source Files
Web Clients
Calling SOAP Web Services
Using Authentication in a Twisted Server
Sending Mail Using SMTP
Programming .Net Windows Applications
Label
TrackBar
Splitter
Updating Data Using DataSets
Exceptions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies