Hack the planet
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:
* Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
*
Map attack surfaces and recognize potential entry points
*
Break client-side controls implemented within HTML, Java(r), ActiveX(r), and Flash(r)
*
Uncover subtle logic flaws that leave applications exposed
*
Use automation to speed up your attacks, with devastating results
*
Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP
Know your enemy
To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.
Additional resources online at www.wiley.com/go/webhacker
* Source code for scripts in this book
*
Links to tools and resources
*
Checklist of tasks involved in attacking applications
*
Answers to the questions posed in each chapter
*
A hacking challenge prepared by the authors
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dafydd Stuttard is a Principal Security Consultant at Next Generation Security Software, where he leads the web application security competency. He has nine years' experience in security consulting and specializes in the penetration testing of web applications and compiled software.
Dafydd has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to several software manufacturers and governments to help secure their compiled software. Dafydd is an accomplished programmer in several languages, and his interests include developing tools to facilitate all kinds of software security testing.
Dafydd has developed and presented training courses at the Black Hat security conferences around the world. Under the alias "PortSwigger," Dafydd created the popular Burp Suite of web application hacking tools. Dafydd holds master's and doctorate degrees in philosophy from the University of Oxford.
Marcus Pinto is a Principal Security Consultant at Next Generation Security Software, where he leads the database competency development team, and has lead the development of NGS' primary training courses. He has eight years' experience in security consulting and specializes in penetration testing of web applications and supporting architectures.
Marcus has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to the development projects of several security-critical applications. He has worked extensively with large-scale web application deployments in the financial services industry.
Marcus has developed and presented database and web application training courses at the Black Hat and other security conferences around the world. Marcus holds a master's degree in physics from the University of Cambridge.
Hack the planet
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:
* Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
*
Map attack surfaces and recognize potential entry points
*
Break client-side controls implemented within HTML, Java(r), ActiveX(r), and Flash(r)
*
Uncover subtle logic flaws that leave applications exposed
*
Use automation to speed up your attacks, with devastating results
*
Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP
Know your enemy
To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.
Additional resources online at www.wiley.com/go/webhacker
* Source code for scripts in this book
*
Links to tools and resources
*
Checklist of tasks involved in attacking applications
*
Answers to the questions posed in each chapter
*
A hacking challenge prepared by the authors
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Giant Giant, Reston, VA, USA
paperback. Zustand: Good. Good condition.No marking/highlighting.Cover and pages may show some wear.Not Satisfied? Contact us to get a refund. Bestandsnummer des Verkäufers BRG-30_2_679
Anzahl: 1 verfügbar
Anbieter: Dream Books Co., Denver, CO, USA
Zustand: acceptable. This copy has clearly been enjoyedâ"expect noticeable shelf wear and some minor creases to the cover. Binding is strong, and all pages are legible. May contain previous library markings or stamps. Bestandsnummer des Verkäufers DBV.0470170778.A
Anzahl: 1 verfügbar
Anbieter: Goodwill Southern California, Los Angeles, CA, USA
Zustand: good. Paperback Book. Bestandsnummer des Verkäufers LACV.0470170778.G
Anzahl: 1 verfügbar
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. Bestandsnummer des Verkäufers 00099054085
Anzahl: 1 verfügbar
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00099276995
Anzahl: 1 verfügbar
Anbieter: Greenworld Books, Arlington, TX, USA
Zustand: good. Fast Free Shipping â" Good condition. It may show normal signs of use, such as light writing, highlighting, or library markings, but all pages are intact and the book is fully readable. A solid, complete copy that's ready to enjoy. Bestandsnummer des Verkäufers GWV.0470170778.G
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_450516487
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G0470170778I3N00
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Bestandsnummer des Verkäufers 5470039-6
Anzahl: 1 verfügbar
Anbieter: MI Re-Tale, Dacula, GA, USA
Paperback. Zustand: Very Good. Very nice book with light wear. Book only. Bestandsnummer des Verkäufers 210421002
Anzahl: 1 verfügbar