Hack the planet
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:
* Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
*
Map attack surfaces and recognize potential entry points
*
Break client-side controls implemented within HTML, Java(r), ActiveX(r), and Flash(r)
*
Uncover subtle logic flaws that leave applications exposed
*
Use automation to speed up your attacks, with devastating results
*
Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP
Know your enemy
To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.
Additional resources online at www.wiley.com/go/webhacker
* Source code for scripts in this book
*
Links to tools and resources
*
Checklist of tasks involved in attacking applications
*
Answers to the questions posed in each chapter
*
A hacking challenge prepared by the authors
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dafydd Stuttard is a Principal Security Consultant at Next Generation Security Software, where he leads the web application security competency. He has nine years' experience in security consulting and specializes in the penetration testing of web applications and compiled software.
Dafydd has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to several software manufacturers and governments to help secure their compiled software. Dafydd is an accomplished programmer in several languages, and his interests include developing tools to facilitate all kinds of software security testing.
Dafydd has developed and presented training courses at the Black Hat security conferences around the world. Under the alias "PortSwigger," Dafydd created the popular Burp Suite of web application hacking tools. Dafydd holds master's and doctorate degrees in philosophy from the University of Oxford.
Marcus Pinto is a Principal Security Consultant at Next Generation Security Software, where he leads the database competency development team, and has lead the development of NGS' primary training courses. He has eight years' experience in security consulting and specializes in penetration testing of web applications and supporting architectures.
Marcus has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to the development projects of several security-critical applications. He has worked extensively with large-scale web application deployments in the financial services industry.
Marcus has developed and presented database and web application training courses at the Black Hat and other security conferences around the world. Marcus holds a master's degree in physics from the University of Cambridge.
Hack the planet
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to:
* Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applications
*
Map attack surfaces and recognize potential entry points
*
Break client-side controls implemented within HTML, Java(r), ActiveX(r), and Flash(r)
*
Uncover subtle logic flaws that leave applications exposed
*
Use automation to speed up your attacks, with devastating results
*
Delve into source code and spot common vulnerabilities in languages like C#, Java, and PHP
Know your enemy
To defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.
Additional resources online at www.wiley.com/go/webhacker
* Source code for scripts in this book
*
Links to tools and resources
*
Checklist of tasks involved in attacking applications
*
Answers to the questions posed in each chapter
*
A hacking challenge prepared by the authors
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Goodwill Southern California, Los Angeles, CA, USA
Zustand: good. Paperback Book. Bestandsnummer des Verkäufers LACV.0470170778.G
Anzahl: 1 verfügbar
Anbieter: Orion Tech, Kingwood, TX, USA
paperback. Zustand: Good. Bestandsnummer des Verkäufers 0470170778-3-31463338
Anzahl: 1 verfügbar
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. Bestandsnummer des Verkäufers 00099054085
Anzahl: 1 verfügbar
Anbieter: MI Re-Tale, Dacula, GA, USA
Paperback. Zustand: Very Good. Very nice book with light wear. Book only. Bestandsnummer des Verkäufers 210421002
Anzahl: 1 verfügbar
Anbieter: Goodwill of Silicon Valley, SAN JOSE, CA, USA
Zustand: very_good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in very good condition! The cover and any other included accessories are also in very good condition showing some minor use. The spine is straight, there are no rips tears or creases on the cover or the pages. Bestandsnummer des Verkäufers GWSVV.0470170778.VG
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bestandsnummer des Verkäufers GOR004097849
Anzahl: 2 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Bestandsnummer des Verkäufers M00470170778-G
Anzahl: 1 verfügbar
Anbieter: Stephen White Books, Bradford, Vereinigtes Königreich
paperback. Zustand: Good. Ex-library book, usual markings. Well read with some wear but still very useable. Quick dispatch from UK seller. Bestandsnummer des Verkäufers mon0000526544
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Paperback. Zustand: new. New Copy. Customer Service Guaranteed. Bestandsnummer des Verkäufers 41T86_93_0470170778
Anzahl: 1 verfügbar
Anbieter: BennettBooksLtd, Los Angeles, CA, USA
paperback. Zustand: New. In shrink wrap. Looks like an interesting title! Bestandsnummer des Verkäufers Q-0470170778
Anzahl: 1 verfügbar