Cargando…

Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications /

Taking a close look at the types of tools available to you, this book explains how learning to find vulnerabilities in websites will help you become a better penetration tester. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sinha, Sanjib (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York, New York] : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1139335675
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 200205s2019 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d K6U  |d UKAHL  |d BWN  |d YDX  |d OCLCQ  |d OCLCO  |d KSU  |d OCLCQ 
019 |a 1128100921 
020 |a 9781484253915 
020 |a 1484253914 
020 |z 9781484253908 
020 |z 1484253906 
035 |a (OCoLC)1139335675  |z (OCoLC)1128100921 
037 |a CL0501000094  |b Safari Books Online 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Sinha, Sanjib,  |e author. 
245 1 0 |a Bug bounty hunting for web security :  |b find and exploit vulnerabilities in web sites and applications /  |c Sanjib Sinha. 
264 1 |a [New York, New York] :  |b Apress,  |c [2019] 
264 2 |a New York, NY :  |b Springer Science+Business Media New York 
264 4 |c ©2019 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Online resource; title from cover (viewed February 4, 2020). 
520 |a Taking a close look at the types of tools available to you, this book explains how learning to find vulnerabilities in websites will help you become a better penetration tester. --  |c Edited summary from book. 
505 0 |a Chapter 1: Introduction to Hunting Bugs -- Chapter 2: Setting up Your Environment -- Chapter 3: How to inject Request Forgery -- Chapter 4: How to exploit through Cross Site Scripting (XSS) -- Chapter 5: Header Injection and URL Redirection -- Chapter 6: Malicious Files -- Chapter 7: Poisoning Sender Policy Framework (SPF) -- Chapter 8: Injecting Unintended XML -- Chapter 9: Finding Command Injection Vulnerabilities -- Chapter 10: Finding HTML and SQL Injection Vulnerabilities -- Appendix: Further Reading. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Web sites  |x Security measures. 
650 0 |a Web applications  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Web sites  |x Security measures.  |2 fast  |0 (OCoLC)fst01173267 
776 0 8 |i Print version:  |a Sinha, Sanjib.  |t Bug bounty hunting for web security.  |d [New York, New York] : Apress, [2019]  |z 1484253906  |z 9781484253908  |w (OCoLC)1113884860 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484253915/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36986042 
938 |a YBP Library Services  |b YANK  |n 300953929 
994 |a 92  |b IZTAP