Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Modern Web Penetration Testing

Buy

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers

Book Description

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.

We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.

We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.

Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.

This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

What you will learn

  • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
  • Work with different security tools to automate most of the redundant tasks
  • See different kinds of newly-designed security headers and how they help to provide security
  • Exploit and detect different kinds of XSS vulnerabilities
  • Protect your web application using filtering mechanisms
  • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
  • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
  • Get to know how to test REST APIs to discover security issues in them

About the Author

Prakhar Prasad is a web application security researcher and penetration tester from India. He has been a successful participant in various bug bounty programs and has discovered security flaws on websites such as Google, Facebook, Twitter, PayPal, Slack, and many more. He secured the tenth position worldwide in the year 2014 at HackerOne's platform. He is OSCP and OSWP certified, which are some of the most widely respected certifications in the information security industry. He occasionally performs training and security assessment for various government, non-government, and educational organizations.

Table of Contents

  1. Common Security Protocols
  2. Information Gathering
  3. Cross-Site Scripting
  4. Cross-Site Request Forgery
  5. Exploiting SQL Injection
  6. File Upload Vulnerabilities
  7. Metasploit and Web
  8. XML Attacks
  9. Emerging Attack Vectors
  10. OAuth 2.0 Security
  11. API Testing Methodology
(HTML tags aren't allowed.)

Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
What do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just...
Handbook of Odors in Plastic Materials
Handbook of Odors in Plastic Materials

Several reasons are behind formation of odors in materials, including the following:

  • Use of other materials than polymer, especially materials required in processing
  • Use of various process parameters and their severity in degradation of components of formulation
  • Recycling of...
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...


Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
Russian For Dummies (Language & Literature)
Russian For Dummies (Language & Literature)

Covers common expressions, conversations, and cultural notes

Your fun and friendly guide to communicating in Russian

Whether you're a student, a traveler, or a businessperson, or if you just want to speak basic Russian, you'll find this book packed with practical lessons...

The Male Patient in Aesthetic Medicine
The Male Patient in Aesthetic Medicine

The demand for cosmetic procedures by male patients has increased in recent years. With this trend has come the realization that male aesthetic needs are different from female aesthetic needs. This book is the first hands-on guide dedicated exclusively to the aesthetic treatment of the male patient, and provides cosmetic surgeons with important...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy