Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Buy

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • Explore new tools in the Kali Linux ecosystem for web penetration testing

Book Description

Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing.

Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools.

As you make your way through the book, you will learn how to use automated scanners to find security ?aws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively.

By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities.

What you will learn

  • Set up a secure penetration testing laboratory
  • Use proxies, crawlers, and spiders to investigate an entire website
  • Identify cross-site scripting and client-side vulnerabilities
  • Exploit vulnerabilities that allow the insertion of code into web applications
  • Exploit vulnerabilities that require complex setups
  • Improve testing efficiency using automated vulnerability scanners
  • Learn how to circumvent security controls put in place to prevent attacks

Who this book is for

Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.

Table of Contents

  1. Setting up Kali Linux and the Testing Lab
  2. Reconnaissance
  3. Using Proxies, Crawlers and Spiders
  4. Testing Authentication and Session Management
  5. Cross-Site Scripting and Client-Side Attacks
  6. Exploiting Injection Vulnerabilities
  7. Exploiting Platform Vulnerabilities
  8. Using Automated Scanners
  9. Bypassing Basic Security Controls
  10. Mitigation of OWASP Top 10 Vulnerabilities
(HTML tags aren't allowed.)

Groovy Programming: An Introduction for Java Developers
Groovy Programming: An Introduction for Java Developers
Groovy Programming is an introduction to the Java-based scripting language Groovy. Groovy has much in common with popular scripting languages such as Perl, Python, and Ruby, but is written in a Java-like syntax. And, unlike these other languages, Groovy is sanctioned by the Java community for use on the Java platform. Since it is...
Advanced Object Oriented Programming with Visual FoxPro 6.0
Advanced Object Oriented Programming with Visual FoxPro 6.0
Anyone reading this forward foreword has to have an interest in object-oriented programming in Visual FoxPro. This is called ""natural selection"" in computer terms. Until now you could buy good FoxPro programming books and good (sometimes not-so-good) object-oriented programming books, but you couldn''t buy a good Visual FoxPro...
Learn Windows IIS in a Month of Lunches
Learn Windows IIS in a Month of Lunches

Summary

Learn Windows IIS in a Month of Lunches is an innovative tutorial designed for busy administrators. Even if you have no prior exposure to IIS, you can follow the crisp explanations, examples, and exercises in this concise, easy-to-read book. Just set aside one hour a day—lunchtime would be...


Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders
Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders

A comprehensive book filled with technical analysis tools and strategies for the advanced ETF trader

Advanced Technical Analysis of ETFs is an important resource for sophisticated ETF traders that contains a wealth of expanded strategies for technical trade setups and includes the author's best real trade examples...

So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
Embark on a career in embedded engineering; this practical guide will show you how to succeed!

In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, "How do I become an embedded engineer?" Embedded professionals agree that there is a treacherous gap between
...
Microsoft Windows PowerShell: TFM
Microsoft Windows PowerShell: TFM

"POWERSHELL" is Microsoft's first recognition of the value of administrative scripting and automation, providing Windows administrators with a consistent, powerful way to automate Windows and other Microsoft server products (such as Exchange Server). In this groundbreaking book, scripting gurus Don Jones and Jeffery Hicks teach you...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy