Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Modern Web Penetration Testing

Buy

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers

Book Description

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.

We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.

We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.

Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.

This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

What you will learn

  • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
  • Work with different security tools to automate most of the redundant tasks
  • See different kinds of newly-designed security headers and how they help to provide security
  • Exploit and detect different kinds of XSS vulnerabilities
  • Protect your web application using filtering mechanisms
  • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
  • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
  • Get to know how to test REST APIs to discover security issues in them

About the Author

Prakhar Prasad is a web application security researcher and penetration tester from India. He has been a successful participant in various bug bounty programs and has discovered security flaws on websites such as Google, Facebook, Twitter, PayPal, Slack, and many more. He secured the tenth position worldwide in the year 2014 at HackerOne's platform. He is OSCP and OSWP certified, which are some of the most widely respected certifications in the information security industry. He occasionally performs training and security assessment for various government, non-government, and educational organizations.

Table of Contents

  1. Common Security Protocols
  2. Information Gathering
  3. Cross-Site Scripting
  4. Cross-Site Request Forgery
  5. Exploiting SQL Injection
  6. File Upload Vulnerabilities
  7. Metasploit and Web
  8. XML Attacks
  9. Emerging Attack Vectors
  10. OAuth 2.0 Security
  11. API Testing Methodology
(HTML tags aren't allowed.)

Image Processing and Communications Challenges 5 (Advances in Intelligent Systems and Computing)
Image Processing and Communications Challenges 5 (Advances in Intelligent Systems and Computing)

This textbook collects a series of research papers in the area of Image Processing and Communications which not only introduce a summary of current technology but also give an outlook of potential feature problems in this area.

The key objective of the book is to provide a collection of comprehensive references on some recent...

Fixed Effects Regression Methods for Longitudinal Data Using SAS
Fixed Effects Regression Methods for Longitudinal Data Using SAS
Every empirical researcher knows that randomized experiments have major advantages over observational studies in making causal inferences. Randomization of subjects to different treatment conditions ensures that the treatment groups, on average, are identical with respect to all possible characteristics of the subjects, regardless of whether those...
VMware vRealize Orchestrator Cookbook
VMware vRealize Orchestrator Cookbook

Master the configuration, programming, and interaction of plugins with Orchestrator to efficiently automate your VMware infrastructure

About This Book

  • Program with Orchestrator to automate and synchronize your infrastructure
  • Integrate the base plug-ins into your workflows
  • ...

Photos for Mac and iOS: The Missing Manual
Photos for Mac and iOS: The Missing Manual

Apple’s new Photos app lets you do a whole lot more than simply store and edit pictures and videos on a Mac or iOS device. With this comprehensive guide, you’ll learn how to import, organize, and share your digital memories, as well as how to improve, print, and use your photos in creative projects. With Lesa...

Data Broadcasting: Merging Digital Broadcasting with the Internet, Revised Edition
Data Broadcasting: Merging Digital Broadcasting with the Internet, Revised Edition

An updated and revised edition of Data Broadcasting: The Technology and the Business, c1999. Features new sections on wireless communications, and explains how data broadcasting can solve traffic problems on the Internet. For executives and developers in the telecommunications, software, hardware and media industries. Softcover.
...

Engineering Science, Fifth Edition
Engineering Science, Fifth Edition
The most comprehensive engineering science text available - fully in line with the latest pre-degree course requirements

. Generic topic-based approach - ensures suitability for all vocational and pre-degree level students
. Coverage of all the mechanical, electrical and electronic principles
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy