Home » Web development » Hacking Exposed Web Applications

Hacking Exposed Web Applications

Hacking Exposed Web Applications


Download free course Hacking Exposed Web Applications, pdf file on 416 pages by Joel Scambray, Mike Shema.
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hacker's devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. You'll get in-depth coverage of real-world hacks-both simple and sophisticated-and detailed countermeasures to protect against them.

What you'll learn:
- The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable platforms and applications
- How attackers identify potential weaknesses in Web application components
- What devastating vulnerabilities exist within Web server platforms such as Apache, Microsoft's Internet Information Server (IIS), Netscape Enterprise Server, J2EE, ASP.NET, and more
- How to survey Web applications for potential vulnerabilities -including checking directory structures, helper files, Java classes and applets, HTML comments, forms, and query strings
- Attack methods against authentication and session management features such as cookies, hidden tags, and session identifiers
- Most common input validation attacks-crafted input, command execution characters, and buffer overflows
- Countermeasures for SQL injection attacks such as robust error handling, custom stored procedures, and proper database configuration
- XML Web services vulnerabilities and best practices
- Tools and techniques used to hack Web clients-including cross-site scripting, active content attacks and cookie manipulation
-Valuable checklists and tips on hardening Web applications and clients based on the authors' consulting experiences

Table of contents

  • Reconnaissance
  • Introduction to Web Applications and Security
  • Profiling
  • Hacking Web Servers
  • Surveying the Application
  • The Attack
  • Authentication
  • Authorization
  • Attacking Session State Management
  • Input Validation Attacks
  • Attacking Web Datastores
  • Attacking Web Services
  • Hacking Web Application Management
  • Web Client Hacking
  • Case Studies
  • Appendixes
  • Web Site Security Checklist
  • Web Hacking Tools and Techniques Cribsheet
  • Using Libwhisker
  • UrlScan Installation and Configuration

Pages : 416
File type : PDF
Downloads: 35
Submitted On: 2022-02-02
License: Open Publication License
Author(s): Joel Scambray, Mike Shema

Take advantage of this course called Hacking Exposed Web Applications to improve your Web development skills and better understand web.

This course is adapted to your level as well as all web pdf courses to better enrich your knowledge.

All you need to do is download the training document, open it and start learning web for free.

This tutorial has been prepared for the beginners to help them understand basic web Web development. After completing this tutorial you will find yourself at a moderate level of expertise in web from where you can take yourself to next levels.

This tutorial is designed for web students who are completely unaware of web concepts but they have basic understanding on Web development training.

Download

Tutorials in the same categorie :