How to attack and defend your website
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP prot...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Massachusetts :
Syngress
2015.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629220906719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Table of contents
- Author Biography
- Contributing Editor Biography
- Introduction
- Chapter 1 - Web Technologies
- 1.1 - Web servers
- 1.2 - Client-side versus server-side programming languages
- 1.3 - JavaScript - what is it?
- 1.4 - What can JavaScript do?
- 1.5 - What can JavaScript not do?
- 1.6 - Databases
- 1.7 - What about HTML?
- 1.8 - Web technologies - putting it together
- 1.9 - Digging deeper
- 1.10 - Hypertext Transfer Protocol (HTTP)
- 1.11 - Verbs
- 1.12 - Special characters and encodings
- 1.13 - Cookies, sessions, and authentication
- 1.14 - Short exercise: Linux machine setup
- 1.15 - Using the Burp Suite intercepting proxy
- 1.16 - Why is the intercepting proxy important?
- 1.17 - Short exercise - using the Burp Suite decoder
- 1.18 - Short exercise - getting comfortable with HTTP and Burp Suite
- 1.18.1 - Solution
- 1.19 - Understanding the application
- 1.20 - The Burp Suite site map
- 1.21 - Discovering content and structures
- 1.22 - Understanding an application
- Chapter 2 - Exploitation
- 2.1 - Bypassing client side controls
- 2.1.1 - Steps for Bypassing Controls
- 2.2 - Bypassing client-side controls - example
- 2.2.1 - Short Exercise: Bypassing Client-Side Control
- 2.3 - Bypassing client-side controls - exercise solution
- 2.4 - SQL injection
- 2.5 - SQL injection
- 2.6 - Short Exercise: Pwning with SQLMap
- 2.6.1 - Hack Steps
- 2.6.2 - Solution: Pwning with SQLMap
- 2.7 - Cross-site scripting (XSS)
- 2.8 - Stored cross-site scripting XSS
- 2.9 - Short exercise: using stored XSS to deface a website
- 2.9.1 - Solution - Using Stored XSS
- Chapter 3 - Finding Vulnerabilities
- 3.1 - The basic process - steps
- 3.2 - Exercise - finding vulnerabilities.