It's Raining Books Sale
 
 

Recently Viewed clear list


Interviews | September 2, 2014

Jill Owens: IMG David Mitchell: The Powells.com Interview



David MitchellDavid Mitchell's newest mind-bending, time-skipping novel may be his most accomplished work yet. Written in six sections, one per decade, The Bone... Continue »
  1. $21.00 Sale Hardcover add to wish list

    The Bone Clocks

    David Mitchell 9781400065677

spacer
Qualifying orders ship free.
$30.00
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Burnside - Bldg. 2 Networking- Computer Security

This title in other editions

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

by

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws Cover

 

Synopses & Reviews

Publisher Comments:

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:

  • Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
  • Map attack surfaces and recognize potential entry points

  • Break client-side controls implemented within HTML, Java®, ActiveX®, and Flash®

  • Uncover subtle logic flaws that leave applications exposed

  • Use automation to speed up your attacks, with devastating results

  • Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP

Know your enemy

To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.

Additional resources online at www.wiley.com/go/webhacker

  • Source code for scripts in this book
  • Links to tools and resources

  • Checklist of tasks involved in attacking applications

  • Answers to the questions posed in each chapter

  • A hacking challenge prepared by the authors

Book News Annotation:

This handbook to hacking techniques is not designed to be a tutorial on illegal computer crime, but rather a safety precaution for testing software applications and websites. Studdard and Pinto, both experts in the field of computer security and defense against hacking, stress the concept of "know thy enemy" in explaining how hackers ply their trade. A companion website is also presented to supply additional anti-hacking resources for IT professional and web designers. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:

  • Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
  • Map attack surfaces and recognize potential entry points

  • Break client-side controls implemented within HTML, Java®, ActiveX®, and Flash®

  • Uncover subtle logic flaws that leave applications exposed

  • Use automation to speed up your attacks, with devastating results

  • Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP

Know your enemy

To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.

Additional resources online at www.wiley.com/go/webhacker

  • Source code for scripts in this book
  • Links to tools and resources

  • Checklist of tasks involved in attacking applications

  • Answers to the questions posed in each chapter

  • A hacking challenge prepared by the authors

Synopsis:

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

About the Author

Dafydd Stuttard is a Principal Security Consultant at Next Generation Security Software, where he leads the web application security competency. He has nine years’ experience in security consulting and specializes in the penetration testing of web applications and compiled software.

Dafydd has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to several software manufacturers and governments to help secure their compiled software. Dafydd is an accomplished programmer in several languages, and his interests include developing tools to facilitate all kinds of software security testing.

Dafydd has developed and presented training courses at the Black Hat security conferences around the world. Under the alias “PortSwigger,” Dafydd created the popular Burp Suite of web application hacking tools. Dafydd holds master’s and doctorate degrees in philosophy from the University of Oxford.

Marcus Pinto is a Principal Security Consultant at Next Generation Security Software, where he leads the database competency development team, and has lead the development of NGS’ primary training courses. He has eight years’ experience in security consulting and specializes in penetration testing of web applications and supporting architectures.

Marcus has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to the development projects of several security-critical applications. He has worked extensively with large-scale web application deployments in the financial services industry.

Marcus has developed and presented database and web application training courses at the Black Hat and other security conferences around the world. Marcus holds a master’s degree in physics from the University of Cambridge.

Table of Contents

Acknowledgments.

Introduction.

Chapter 1 Web Application (In)security.

Chapter 2 Core Defense Mechanisms.

Chapter 3 Web Application Technologies.

Chapter 4 Mapping the Application.

Chapter 5 Bypassing Client-Side Controls.

Chapter 6 Attacking Authentication.

Chapter 7 Attacking Session Management.

Chapter 8 Attacking Access Controls.

Chapter 9 Injecting Code.

Chapter 10 Exploiting Path Traversal.

Chapter 11 Attacking Application Logic.

Chapter 12 Attacking Other Users.

Chapter 13 Automating Bespoke Attacks.

Chapter 14 Exploiting Information Disclosure.

Chapter 15 Attacking Compiled Applications.

Chapter 16 Attacking Application Architecture.

Chapter 17 Attacking the Web Server.

Chapter 18 Finding Vulnerabilities in Source Code.

Chapter 19 A Web Application Hacker's Toolkit.

Chapter 20 A Web Application Hacker's Methodology.

Index.

Product Details

ISBN:
9780470170779
Subtitle:
Discovering and Exploiting Security Flaws
Author:
Stuttard, Dafydd
Author:
Pinto, Marcus
Publisher:
Wiley
Subject:
Security - General
Subject:
Computer security
Subject:
Security measures
Subject:
Security
Subject:
Internet - Security measures
Subject:
vulnerability pen testing penetration code extracts exploits exploiting e-commerce ecommerce login mechanisms injecting logic flaws web application bespoke brute force security burp portswigger black hat
Subject:
Networking/Security
Subject:
Networking-Computer Security
Copyright:
Publication Date:
20071022
Binding:
Electronic book text in proprietary or open standard format
Grade Level:
General/trade
Language:
English
Pages:
768
Dimensions:
9.22x7.40x1.64 in. 2.40 lbs.

Other books you might like

  1. JavaScript: The Good Parts Used Trade Paper $21.00
  2. Role Engineering for Enterprise... New Hardcover $104.25
  3. HTTP: The Definitive Guide... New Trade Paper $54.99

Related Subjects

Computers and Internet » Networking » Computer Security

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws Used Trade Paper
0 stars - 0 reviews
$30.00 In Stock
Product details 768 pages John Wiley & Sons - English 9780470170779 Reviews:
"Synopsis" by , Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:

  • Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
  • Map attack surfaces and recognize potential entry points

  • Break client-side controls implemented within HTML, Java®, ActiveX®, and Flash®

  • Uncover subtle logic flaws that leave applications exposed

  • Use automation to speed up your attacks, with devastating results

  • Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP

Know your enemy

To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.

Additional resources online at www.wiley.com/go/webhacker

  • Source code for scripts in this book
  • Links to tools and resources

  • Checklist of tasks involved in attacking applications

  • Answers to the questions posed in each chapter

  • A hacking challenge prepared by the authors

"Synopsis" by , This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.