Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Modern Web Penetration Testing

Buy

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers

Book Description

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.

We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.

We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.

Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.

This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

What you will learn

  • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
  • Work with different security tools to automate most of the redundant tasks
  • See different kinds of newly-designed security headers and how they help to provide security
  • Exploit and detect different kinds of XSS vulnerabilities
  • Protect your web application using filtering mechanisms
  • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
  • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
  • Get to know how to test REST APIs to discover security issues in them

About the Author

Prakhar Prasad is a web application security researcher and penetration tester from India. He has been a successful participant in various bug bounty programs and has discovered security flaws on websites such as Google, Facebook, Twitter, PayPal, Slack, and many more. He secured the tenth position worldwide in the year 2014 at HackerOne's platform. He is OSCP and OSWP certified, which are some of the most widely respected certifications in the information security industry. He occasionally performs training and security assessment for various government, non-government, and educational organizations.

Table of Contents

  1. Common Security Protocols
  2. Information Gathering
  3. Cross-Site Scripting
  4. Cross-Site Request Forgery
  5. Exploiting SQL Injection
  6. File Upload Vulnerabilities
  7. Metasploit and Web
  8. XML Attacks
  9. Emerging Attack Vectors
  10. OAuth 2.0 Security
  11. API Testing Methodology
(HTML tags aren't allowed.)

JavaFX Script: Dynamic Java Scripting for Rich Internet / Client-side Applications
JavaFX Script: Dynamic Java Scripting for Rich Internet / Client-side Applications
JavaFX Script makes it easy for developers to quickly develop high-quality UI-intensive applications very quickly. As JavaFX Script: Dynamic Java Scripting for Rich Internet/Client-side Applications demonstrates, developers can develop Rich Internet Applications and rich client-side user interfaces...
Software Studies: A Lexicon (Leonardo Books)
Software Studies: A Lexicon (Leonardo Books)
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In...
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...


Programming Logic and Design, Comprehensive
Programming Logic and Design, Comprehensive

Prepare beginning programmers with the most important principles for developing structured program logic with Farrell's highly effective PROGRAMMING LOGIC AND DESIGN, COMPREHENSIVE, 7E. This popular text takes a unique, language-independent approach to programming with a distinctive emphasis on modern conventions. The book's clear,...

Introduction to Electric Circuits
Introduction to Electric Circuits

Praised for its highly accessible, real-world approach, the 6th Edition demonstrates how the analysis and design of electric circuits are inseparably intertwined with the ability of the engineer to design complex electronic, communication, computer, and control systems as well as consumer products. The book offers numerous design problems and...

Methods in Rhizosphere Biology Research
Methods in Rhizosphere Biology Research
This book compiles various methodologies used in understanding interactions within the rhizosphere. An in-depth understanding of the rhizosphere is essential to developing successful strategies for future sustainable agriculture. The book summarizes methods and techniques used to study the mechanisms involved in mutualistic symbioses and...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy