• The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws See large image

    The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback) By (author) Dafydd Stuttard, By (author) Marcus Pinto

    Unavailable

    Sorry we can't get this title, the button below links through to AbeBooks who may have this title (opens in new window).

    Try AbeBooks | Add to wishlist

    DescriptionThis book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for The Web Application Hacker's Handbook

    Title
    The Web Application Hacker's Handbook
    Subtitle
    Discovering and Exploiting Security Flaws
    Authors and contributors
    By (author) Dafydd Stuttard, By (author) Marcus Pinto
    Physical properties
    Format: Paperback
    Number of pages: 768
    Width: 190 mm
    Height: 235 mm
    Thickness: 41 mm
    Weight: 1,162 g
    Language
    English
    ISBN
    ISBN 13: 9780470170779
    ISBN 10: 0470170778
    Classifications

    BIC E4L: COM
    B&T Book Type: NF
    Nielsen BookScan Product Class 3: S10.1
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 06
    BIC subject category V2: UDB
    B&T Modifier: Text Format: 41
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Merchandise Category: COM
    LC subject heading:
    BIC subject category V2: UTN
    Warengruppen-Systematik des deutschen Buchhandels: 16360
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading:
    Ingram Subject Code: XY
    B&T Approval Code: A93663053, A93906426
    BISAC V2.8: COM060130, COM060040
    LC subject heading: ,
    Libri: DATE6340
    LC classification: TK5105.875.I57 S85 2008
    Illustrations note
    s/w. Abb.
    Publisher
    John Wiley and Sons Ltd
    Imprint name
    John Wiley & Sons Ltd
    Publication date
    19 October 2007
    Publication City/Country
    Chichester
    Author Information
    Dafydd Stuttard is a Principal Security Consultant at Next Generation Security Software, where he leads the web application security competency. He has nine years' experience in security consulting and specializes in the penetration testing of web applications and compiled software. Dafydd has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to several software manufacturers and governments to help secure their compiled software. Dafydd is an accomplished programmer in several languages, and his interests include developing tools to facilitate all kinds of software security testing. Dafydd has developed and presented training courses at the Black Hat security conferences around the world. Under the alias "PortSwigger," Dafydd created the popular Burp Suite of web application hacking tools. Dafydd holds master's and doctorate degrees in philosophy from the University of Oxford. Marcus Pinto is a Principal Security Consultant at Next Generation Security Software, where he leads the database competency development team, and has lead the development of NGS' primary training courses. He has eight years' experience in security consulting and specializes in penetration testing of web applications and supporting architectures. Marcus has worked with numerous banks, retailers, and other enterprises to help secure their web applications, and has provided security consulting to the development projects of several security-critical applications. He has worked extensively with large-scale web application deployments in the financial services industry. Marcus has developed and presented database and web application training courses at the Black Hat and other security conferences around the world. Marcus holds a master's degree in physics from the University of Cambridge.
    Back cover copy
    Hack the planetWeb applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.This is hands-on stuff. The authors, recognized experts in security testing, take a practical approach, showing you the detailed steps involved in finding and exploiting security flaws in web applications. You will learn to: Defeat an application's core defense mechanisms and gain unauthorized access, even to the most apparently secure applicationsMap attack surfaces and recognize potential entry pointsBreak client-side controls implemented within HTML, Java(R), ActiveX(R), and Flash(R)Uncover subtle logic flaws that leave applications exposedUse automation to speed up your attacks, with devastating resultsDelve into source code and spot common vulnerabilities in languages like C#, Java, and PHPKnow your enemyTo defend an application, you must first know its weaknesses. If you design or maintain web applications, this book will arm you with the protective measures you need to prevent all of the attacks described. If you're a developer, it will show you exactly where and how to strengthen your defenses.Additional resources online at www.wiley.com/go/webhackerSource code for scripts in this bookLinks to tools and resourcesChecklist of tasks involved in attacking applicationsAnswers to the questions posed in each chapterA hacking challenge prepared by the authors
    Table of contents
    Acknowledgments. Introduction. Chapter 1 Web Application (In)security. Chapter 2 Core Defense Mechanisms. Chapter 3 Web Application Technologies. Chapter 4 Mapping the Application. Chapter 5 Bypassing Client-Side Controls. Chapter 6 Attacking Authentication. Chapter 7 Attacking Session Management. Chapter 8 Attacking Access Controls. Chapter 9 Injecting Code. Chapter 10 Exploiting Path Traversal. Chapter 11 Attacking Application Logic. Chapter 12 Attacking Other Users. Chapter 13 Automating Bespoke Attacks. Chapter 14 Exploiting Information Disclosure. Chapter 15 Attacking Compiled Applications. Chapter 16 Attacking Application Architecture. Chapter 17 Attacking the Web Server. Chapter 18 Finding Vulnerabilities in Source Code. Chapter 19 A Web Application Hacker's Toolkit. Chapter 20 A Web Application Hacker's Methodology. Index.