Cargando…

Basics of Web Hacking : Tools and Techniques to Attack the Web.

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a ""path of least resistance"" that can be exploited to cause the most damage to a system, with the l...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Pauli, Joshua J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Elsevier Science & Technology, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn851158028
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130628s2013 xx o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d MHW  |d OCLCQ  |d DKDLA  |d OCLCO  |d CDX  |d OCLCF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d DEBBG  |d ZCU  |d DXU  |d MERUC  |d OCLCQ  |d CUY  |d OCLCO  |d UUM  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d PWQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 861745708  |a 1232966929 
020 |a 129968470X  |q (ebk) 
020 |a 9781299684706  |q (ebk) 
020 |a 0124166008  |q (Paper) 
020 |a 9780124166004  |q (Paper) 
020 |a 0124166598  |q (electronic bk.) 
020 |a 9780124166592  |q (electronic bk.) 
029 1 |a AU@  |b 000055899606 
029 1 |a AU@  |b 000058366991 
029 1 |a DEBBG  |b BV044176475 
029 1 |a DEBSZ  |b 431445648 
029 1 |a DKDLA  |b 820120-katalog:999929657905765 
035 |a (OCoLC)851158028  |z (OCoLC)861745708  |z (OCoLC)1232966929 
037 |a 499720  |b MIL 
050 4 |a TK 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Pauli, Joshua J. 
245 1 0 |a Basics of Web Hacking :  |b Tools and Techniques to Attack the Web. 
260 |b Elsevier Science & Technology,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a ""path of least resistance"" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabili. 
505 0 |a Front Cover -- The Basics of Web Hacking: Tools and Techniques to Attack the Web -- Copyright -- Dedication -- Acknowledgments -- Honey Bear -- Lizard -- Baby Bird -- Family and Friends -- Security Community -- Scott White-Technical Reviewer -- Syngress Team -- My Vices -- Biography -- Foreword -- Introduction -- About this Book -- A Hands-on Approach -- What's in this Book? -- A Quick Disclaimer -- Contents -- Chapter 1: The Basics of Web Hacking -- Introduction -- What Is a Web Application? -- What You Need to Know About Web Servers -- What You Need to Know About HTTP -- HTTP Cycles -- Noteworthy HTTP Headers -- Noteworthy HTTP Status Codes -- The Basics of Web Hacking: Our Approach -- Our Targets -- Our Tools -- Web Apps Touch Every Part of IT -- Existing Methodologies -- The Open-Source Security Testing Methodology Manual (OSSTM) -- Penetration Testing Execution Standard (PTES) -- Making Sense of Existing Methodologies -- Most Common Web Vulnerabilities -- Injection -- Cross-site Scripting (XSS) -- Broken Authentication and Session Management -- Cross-site Request Forgery -- Security Misconfiguration -- Setting Up a Test Environment -- Target Web Application -- Installing the Target Web Application -- Configuring the Target Web Application -- DVWA Install Script -- Chapter 2: Web Server Hacking -- Introduction -- Reconnaissance -- Learning About the Web Server -- The Robots.txt File -- Port Scanning -- Nmap -- Updating Nmap -- Running Nmap -- Nmap Scripting Engine (NSE) -- Vulnerability Scanning -- Nessus -- Installing Nessus -- Configuring Nessus -- Running Nessus -- Reviewing Nessus Results -- Nikto -- Exploitation -- Basics of Metasploit -- Search -- Use -- Show Payloads -- Set Payload -- Show Options -- Set Option -- Exploit -- Maintaining Access -- Chapter 3: Web Application Recon and Scanning -- Introduction -- Web Application Recon. 
505 8 |a Basics of a Web Proxy -- Burp Suite -- Configuring Burp Proxy -- Spidering with Burp -- Automated Spidering -- Manual Spidering -- Running Burp Spider -- Web Application Scanning -- What a Scanner Will Find -- What a Scanner Won't Find -- Scanning with ZED Attack Proxy (ZAP) -- Configuring ZAP -- Running ZAP -- Reviewing ZAP Results -- ZAP Brute Force -- Scanning with Burp Scanner -- Configuring Burp Scanner -- Running Burp Scanner -- Reviewing Burp Scanner Results -- Chapter 4: Web Application Exploitation with Injection -- Introduction -- SQL Injection Vulnerabilities -- SQL Interpreter -- SQL for Hackers -- SQL Injection Attacks -- Finding the Vulnerability -- Bypassing Authentication -- Extracting Additional Information -- Harvesting Password Hashes -- Offline Password Cracking -- sqlmap -- Operating System Command Injection Vulnerabilities -- O/S Command Injection for Hackers -- Operating System Command Injection Attacks -- Web Shells -- Chapter 5: Web Application Exploitation with Broken Authentication and Path Traversal -- Introduction -- Authentication and Session Vulnerabilities -- Path Traversal Vulnerabilities -- Brute Force Authentication Attacks -- Intercepting the Authentication Attempt -- Configuring Burp Intruder -- Intruder Payloads -- Running Intruder -- Session Attacks -- Cracking Cookies -- Burp Sequencer -- Other Cookie Attacks -- Path Traversal Attacks -- Web Server File Structure -- Forceful Browsing -- Chapter 6: Web User Hacking -- Introduction -- Cross-Site Scripting (XSS) Vulnerabilities -- Cross-Site Request Forgery (CSRF) Vulnerabilities -- XSS Versus CSRF -- Technical Social Engineering Vulnerabilities -- Web User Recon -- Web User Scanning -- Web User Exploitation -- Cross-Site Scripting (XSS) Attacks -- XSS Payloads -- Reflected XSS Attacks -- Intercepting the Server Response -- Encoding XSS Payloads. 
505 8 |a XSS in URL Address Bar -- XSS Attacks on Session Identifiers -- Stored XSS Attacks -- Persistence of Stored XSS -- Cross-Site Request Forgery (CSRF) Attacks -- User Attack Frameworks -- Social-Engineer Toolkit (SET) -- Other Notable User Attack Frameworks -- Chapter 7: Fixes -- Introduction -- Web Server Fixes -- Server Hardening -- Generic Error Messages -- Web Application Fixes -- Injection Fixes -- Broken Authentication and Session Management Fixes -- Authentication -- Session Management -- Path Traversal Fixes -- Web User Fixes -- The XSS Prevention Cheat Sheet -- Input Validation Cheat Sheet -- Code Defenses for XSS -- Browser Defenses for XSS -- The CSRF Prevention Cheat Sheet -- More CSRF Defenses -- Technical Social Engineering Fixes -- Chapter 8: Next Steps -- Introduction -- Security Community Groups and Events -- Formal Education -- Certifications -- Additional Books -- Index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Web sites  |x Security measures. 
650 0 |a Web applications  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Hackers. 
650 0 |a Computer crimes  |x Prevention. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 6 |a Pirates informatiques. 
650 7 |a computer piracy.  |2 eurovocen 
650 7 |a Internet.  |2 eurovocen 
650 7 |a data protection.  |2 eurovocen 
650 7 |a piratage informatique.  |2 eurovocfr 
650 7 |a Internet.  |2 eurovocfr 
650 7 |a protection des données.  |2 eurovocfr 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Web sites  |x Security measures  |2 fast 
758 |i has work:  |a The basics of web hacking (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFQDVppWQCftQ3XhT3hM8C  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781299684706 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1222592  |z Texto completo 
938 |a Coutts Information Services  |b COUT  |n 25732552 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1222592 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25732552 
994 |a 92  |b IZTAP