Flylib.com
Hacker Web Exploition Uncovered
Hacker Web Exploition Uncovered
ISBN: 1931769494
EAN: N/A
Year: 2005
Pages: 77
BUY ON AMAZON
Hacker Web Exploitation Uncovered
Back Cover
About
Introduction
To the Reader
Chapter 1: The Internet Is a Hostile Environment
Chapter 2: Vulnerabilities in Scripts
Vulnerabilities Specific to PHP Scripts
Errors Specific to Perl Scripts
Errors Not Specific to a Particular Programming Language
Chapter 3: SQL Injection
Looking for Vulnerabilities
Investigating Queries
MySQL
Other Types of Database Servers
Conclusion
Chapter 4: Secure Authorization and Authentication
Logging In
Changing the Appearance of HTML Pages
HTTP Basic Authentication
HTTPS
Methods for Strengthening Protection
Recovery of a Password
Well-Designed Protection
Conclusion
Chapter 5: XSS and Stolen Cookies
Basics
The Danger of the Vulnerability
Changing the Appearance of HTML Pages
Sending Data with JavaScript
Solving Problems
Obtaining Users Cookies
Collecting Statistics
Performing Concealed Actions on Behalf of the Administrator
Fixing a Session
An Event-Processing Vulnerability
Embedding JavaScript Code into the Address Line
Avoiding the XSS Vulnerability
Chapter 6: The Myth about Secure Configuration
Secure PHP Settings
The Apache mod_security Module
Methods for Passive Analysis and Circumvention
HTML Restrictions
Log Files and Detecting the Attacker
Conclusion
Chapter 7: Shared Hosting and Security Issues
Accessing System Owners Files
Files and the Web Server
Hosting and Databases
The Problem with Disclosed Code
The Attacker s Point of View
Conclusion
Chapter 8: A Conceptual Virus
Getting Started
An Overview of Existing Viruses
The Search
The Infection
Conclusion
Appendix 1: CD-ROM Contents
Installing Software from the CD-ROM
Appendix 2: Investigation Tasks
Task 1
Task 2
Task 3
Task 4
Task 5
Task 6
Appendix 3: Solutions
Task 1
Task 2
Task 3
Task 4
Task 5
Task 6
Conclusion
CD Content
Hacker Web Exploition Uncovered
ISBN: 1931769494
EAN: N/A
Year: 2005
Pages: 77
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.1 Authentication with Public Keys
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.6 How to use PuTTY Passphrase Agents
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Security Architecture and Design
Operations Security
Legal, Regulations, Compliance, and Investigations
The Accreditation Phase
Visual C# 2005 How to Program (2nd Edition)
Software Reusability
Introduction
Terminology
Terminology
Wrap-Up
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Team change
Leading change
Mergers and acquisitions
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 11. How Far? How Fast? Geo-Enabling Your Spreadsheet
Hack 46. Map Global Weather Conditions
Hack 84. Build a Free World Gazetteer
Hack 96. Share Geo-Photos on the Web
Hack 97. Set Up an OpenGuide for Your Hometown
DNS & BIND Cookbook
Building and Installing BIND
Configuring a Name Server as Authoritative for Multiple Zones
Limiting NOTIFY Messages
Disabling Caching
Running the Name Server as a User Other than Root
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies