Год издания: 2016
Автор: Prasad P.
Издательство: Packt Publishing
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 298
Описание: Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.
We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.
We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.
Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.
This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
What You Will Learn
- Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
- Work with different security tools to automate most of the redundant tasks
- See different kinds of newly-designed security headers and how they help to provide security
- Exploit and detect different kinds of XSS vulnerabilities
- Protect your web application using filtering mechanisms
- Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
- Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
- Get to know how to test REST APIs to discover security issues in them
1: Common Security Protocols
2: Information Gathering
3: Cross-Site Scripting
4: Cross-Site Request Forgery
5: Exploiting SQL Injection
6: File Upload Vulnerabilities
7: Metasploit and Web
8: XML Attacks
9: Emerging Attack Vectors
10: OAuth 2.0 Security
11: API Testing Methodology