The basics of web hacking tools and techniques to attack the web
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools su...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | TK 5105.59 P38 2013 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100812 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025600.0 | ||
| 008 | 221104 2013 maua bi 000 0 eng d | ||
| 020 | |a 9780124166004 | ||
| 039 | 9 | |a 202211041126 |b VLOAD |c 201501141418 |d zul |c 201411200844 |d faezah |c 201411180940 |d faezah |y 201410132038 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b P38 2013 | ||
| 100 | 1 | |a Pauli, Joshua J. |e author | |
| 245 | 1 | 4 | |a The basics of web hacking |b tools and techniques to attack the web |c Josh Pauli |
| 264 | 1 | |a Waltham, MA |b Syngress is an imprint of Elsevier |c © 2013 | |
| 300 | |a xiii, 145 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a Chapter 1. The basics of web hacking -- Chapter 2. Web server hacking -- Chapter 3. Web application recon and scanning -- Chapter 4. Web application exploitation with injection -- Chapter 5. Web application exploitation with broken authentication and path raversal -- Chapter 6. Web user hacking -- chapter 7. Fixes -- Chapter 8. Next steps | |
| 520 | |a The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 119.80 |h PVK | ||
| 650 | 0 | |a Web sites |x Security measures | |
| 650 | 0 | |a Web applications |x Security measures | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Penetration testing (Computer security) | |
| 650 | 0 | |a Computer hackers | |
| 650 | 0 | |a Computer crimes |x Prevention | |
| 999 | |a vtls000052956 |c 100812 |d 100812 | ||


