Flylib.com
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
ISBN: 0071740643
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
Joel Scambray
,
Vincent Liu
,
Caleb Sima
BUY ON AMAZON
Hacking Exposed Web Applications, Second Edition
Back Cover
About
Foreword
Introduction
How This Book Is Organized
Online Resources And Tools
A Final Word To Our Readers
Chapter 1: Hacking Web Apps 101
Resources
References And Further Reading
Summary
How Are Web APPS Attacked?
Who, When, And Where?
Why Attack Web Applications?
Chapter 2: Profiling
Infrastructure Profiling
References And Further Reading
Summary
General Countermeasures
Application Profiling
Chapter 3: Hacking Web Platforms
Point-And-Click Exploitation Using Metasploit
References And Further Reading
Summary
Web Platform Security Best Practices
Evading Detection
Manual Exploitation
Chapter 4: Web Authentication Attacking
Bypassing Authentication
Some Final Thoughts: Identity Theft
Summary
References And Further Reading
Chapter 5: Attacking Web Authorization
Fingerprinting Authz
Attacking Acls
Attacking Tokens
Authorization Attack Case Studies
Authorization Best Practices
Summary
References And Further Reading
Chapter 6: Input Validation Attacks
Expect The Unexpected
Where To Find Attack Vectors
Bypass Client-Side Validation Routines
Common Input Validation Attacks
Summary
References And Further Reading
Chapter 7: Attacking Web Datastores
SQL Primer
SQL Injection Discovery
Exploit SQL Injection Vulnerabilities
Other Datastore Attacks
Summary
Chapter 8: Attacking XML Web Services
What Is A Web Service?
Attacking Web Services
Web Service Security Basics
Summary
References And Further Reading
Chapter 9: Attacking Web Application Management
Remote Server Management
Web Content Management
Admin Misconfigurations
Developer-Driven Mistakes
Summary
References And Further Reading
Chapter 10: Hacking Web Clients
Exploits
Trickery
General Countermeasures
Summary
References And Further Reading
Chapter 11: Denial-of-Service (DoS) Attacks
Common Dos Attack Techniques
General Dos Countermeasures
Summary
References And Further Reading
Chapter 12: Full-Knowledge Analysis
Threat Modeling
Rank The Threats
Code Review
Security Testing Of Web App Code
Security In The Web Development Process
Summary
References And Further Reading
Chapter 13: Web Application Security Scanners
Technology: Web App Security Scanners
Nontechnical Issues
Summary
References And Further Reading
Appendix A: Web Application Security Checklist
Appendix B: Web Hacking Tools and Techniques Cribsheet
Appendix C: URLScan and ModSecurity
Urlscan
Modsecurity
Summary
References And Further Reading
Appendix D: About the Companion Web Site
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
List of Figures
List of Tables
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
ISBN: 0071740643
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
Joel Scambray
,
Vincent Liu
,
Caleb Sima
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Initiating the Project
Breaking Down the Project Activities
Developing the Project Plan
Executing the Project
The Complete Cisco VPN Configuration Guide
VPN Components
VPN Designs
ISAKMP/IKE Phase 2
VPN Client Troubleshooting
Troubleshooting VPN Connections
C++ How to Program (5th Edition)
Self-Review Exercises
vector Exercises
Self-Review Exercises
Stream Output
Exercises
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Three Sales Process
Chapter Four Precall Planning and Research
Chapter Seven Diagnose Before You Prescribe
Chapter Nine Selling When You re Not First
Appendix B Solution Selling: A Scalable Approach
Extending and Embedding PHP
Building Statically
The Resource Data Type
Setting Up a Host Environment
Array Manipulation
Resources/Lists
Special Edition Using FileMaker 8
FileMaker and Its Marketplace
Aggregate Functions
Delivering Reports
User-Level Internal Security
Migration Choices
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies