The web application hacker's handbook finding and exploiting security flaws

"Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it."...

Full description

Saved in:
Bibliographic Details
Main Authors: Stuttard, Dafydd 1972- (Author), Pinto, Marcus 1978- (Author)
Format: Book
Language:English
Published: Indianapolis, IN John Wiley & Sons, Inc. 2011
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 54810
003 MY-KLNDU
005 20241219014835.0
008 221104 20112011inua 001 0 eng d
020 |a 9781979868242 
020 |z 978118175224 (ebk) 
020 |z 978118175248 (ebk) 
020 |z 978118175232 (ebk) 
039 9 |a 202211041239  |b VLOAD  |y 202006230934  |z faezah 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.76.A65  |b S79 2011 
100 1 |a Stuttard, Dafydd  |d 1972-  |e author 
245 1 4 |a The web application hacker's handbook  |b finding and exploiting security flaws  |c Dafydd Stuttard, Marcus Pinto 
246 3 |a Finding and exploiting security flaws 
264 1 |a Indianapolis, IN  |b John Wiley & Sons, Inc.  |c 2011 
264 4 |c © 2011 
300 |a xxxiii, 878 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
505 0 |a v. 1. -- Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Injecting code -- Exploiting path traversal -- v. 2. -- Attacking application logic -- Attacking other users -- Automating bespoke attacks -- Exploiting information disclosure -- Attacking compiled applications -- Attacking application architecture -- Attacking the Web server -- Finding vulnerabilities in source code -- A Web application hacker's toolkit -- A Web application hacker's methodology 
520 |a "Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it." "This is hands-on stuff. The authors take a practical approach, showing you the steps involved in finding and exploiting security flaws in web applications. You will learn to: defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications; map attack surfaces and recognize potential entry points; break client-side controls implemented within HTML, Java, ActiveX, and Flash; uncover subtle logic flaws that leave applications exposed; use automation to speed up your attacks, with devastating results; and delve into source code and spot common vulnerabilities in language like C#, Java, and PHP." "To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses."--Provided by publisher 
592 |a 00013953  |b 21/1/2015  |c RM 359.80 (SET)  |h PVK (BL) 
650 0 |a Application software  |x Security measures  |v Handbooks, manuals, etc 
650 0 |a Internet  |x Security measures  |v Handbooks, manuals, etc 
650 0 |a Computer security  |v Handbooks, manuals, etc 
700 1 |a Pinto, Marcus  |d 1978-  |e author 
999 |a vtls000065627  |c 54810  |d 54810