The web application hacker's handbook finding and exploiting security flaws
"Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it."...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons, Inc.
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- v. 1.
- Web application (in)security
- Core defense mechanisms
- Web application technologies
- Mapping the application
- Bypassing client-side controls
- Attacking authentication
- Attacking session management
- Attacking access controls
- Injecting code
- Exploiting path traversal
- v. 2.
- Attacking application logic
- Attacking other users
- Automating bespoke attacks
- Exploiting information disclosure
- Attacking compiled applications
- Attacking application architecture
- Attacking the Web server
- Finding vulnerabilities in source code
- A Web application hacker's toolkit
- A Web application hacker's methodology


