The basics of web hacking tools and techniques to attack the web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools su...

Full description

Saved in:
Bibliographic Details
Main Author: Pauli, Joshua J. (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress is an imprint of Elsevier © 2013
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :TK 5105.59 P38 2013

MARC

LEADER 00000nam a2200000 i 4500
001 100812
003 MY-KLNDU
005 20241220025600.0
008 221104 2013 maua bi 000 0 eng d
020 |a 9780124166004 
039 9 |a 202211041126  |b VLOAD  |c 201501141418  |d zul  |c 201411200844  |d faezah  |c 201411180940  |d faezah  |y 201410132038  |z syarifuddin 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b P38 2013 
100 1 |a Pauli, Joshua J.  |e author 
245 1 4 |a The basics of web hacking  |b tools and techniques to attack the web  |c Josh Pauli 
264 1 |a Waltham, MA  |b Syngress is an imprint of Elsevier  |c © 2013 
300 |a xiii, 145 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a Chapter 1. The basics of web hacking -- Chapter 2. Web server hacking -- Chapter 3. Web application recon and scanning -- Chapter 4. Web application exploitation with injection -- Chapter 5. Web application exploitation with broken authentication and path raversal -- Chapter 6. Web user hacking -- chapter 7. Fixes -- Chapter 8. Next steps 
520 |a The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more 
592 |a 00013726  |b 04/11/2014  |c RM 119.80  |h PVK 
650 0 |a Web sites  |x Security measures 
650 0 |a Web applications  |x Security measures 
650 0 |a Computer networks  |x Security measures 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer hackers 
650 0 |a Computer crimes  |x Prevention 
999 |a vtls000052956  |c 100812  |d 100812