The web application hacker's handbook finding and exploiting security flaws

"Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it."...

Full description

Saved in:
Bibliographic Details
Main Authors: Stuttard, Dafydd 1972- (Author), Pinto, Marcus 1978- (Author)
Format: Book
Language:English
Published: Indianapolis, IN John Wiley & Sons, Inc. 2011
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • v. 1.
  • Web application (in)security
  • Core defense mechanisms
  • Web application technologies
  • Mapping the application
  • Bypassing client-side controls
  • Attacking authentication
  • Attacking session management
  • Attacking access controls
  • Injecting code
  • Exploiting path traversal
  • v. 2.
  • Attacking application logic
  • Attacking other users
  • Automating bespoke attacks
  • Exploiting information disclosure
  • Attacking compiled applications
  • Attacking application architecture
  • Attacking the Web server
  • Finding vulnerabilities in source code
  • A Web application hacker's toolkit
  • A Web application hacker's methodology