Hacking Exposed Web Applications
Joel Scambray, Mike Shema
- 出版商: McGraw-Hill Education
- 出版日期: 2002-06-19
- 售價: $1,890
- 貴賓價: 9.5 折 $1,796
- 語言: 英文
- 頁數: 386
- 裝訂: Paperback
- ISBN: 007222438X
- ISBN-13: 9780072224382
-
相關分類:
駭客 Hack
已過版
買這商品的人也買了...
-
$399Hacking Linux Exposed (Paperback)
-
$299Hacking Exposed: Windows 2000 (Paperback)
-
$970Introduction to Algorithms, 2/e
-
$931A First Course in Database Systems, 2/e
-
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$490$417 -
$480$379 -
$720$562 -
$750$638 -
$590$466 -
$1,710$1,625 -
$780$616 -
$720$569 -
$560$504 -
$450$356 -
$1,890$1,796 -
$299$254 -
$480$379 -
$750$593 -
$490$382 -
$480$379 -
$690$587 -
$540$427 -
$650$507 -
$490$441
相關主題
商品描述
This book goes a long way in making the Web a safer place to do business. -- Mark Curphey, Chair of the Open Web Application Security Project
Unleash the hackers arsenal to secure your Web applications
In todays world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hackers devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. Youll get in-depth coverage of real-world hacks--both simple and sophisticated--and detailed countermeasures to protect against them.
What youll learn:
- The proven Hacking Exposed methodology to locate, exploit, and
patch vulnerable platforms and applications
- How attackers identify potential weaknesses in Web application components
- What devastating vulnerabilities exist within Web server platforms such as
Apache, Microsofts Internet Information Server (IIS), Netscape Enterprise
Server, J2EE, ASP.NET, and more
- How to survey Web applications for potential vulnerabilities --including
checking directory structures, helper files, Java classes and applets, HTML
comments, forms, and query strings
- Attack methods against authentication and session management features such
as cookies, hidden tags, and session identifiers
- Most common input validation attacks--crafted input, command execution
characters, and buffer overflows
- Countermeasures for SQL injection attacks such as robust error handling,
custom stored procedures, and proper database configuration
- XML Web services vulnerabilities and best practices
- Tools and techniques used to hack Web clients--including cross-site
scripting, active content attacks and cookie manipulation
- Valuable checklists and tips on hardening Web applications and clients
based on the authors consulting experiences
Contents
Part I: Reconnaissance
1:
Introduction to Web Applications and Security
2:
Profiling
3: Hacking Web Servers
4: Surveying the Application
Part II: The
Attack
5: Authentication
6:
Authorization
7: Attacking Session State
Management
8: Input Validation
Attacks
9: Attacking Web
Datastores
10: Attacking Web
Services
11: Hacking Web Application
Management
12: Web Client Hacking
13: Case Studies
Part III:
Appendixes
A: Web Site Security
Checklist
B: Web Hacking Tools and Techniques
Cribsheet
C: Using Libwhisker
D:
UrlScan Installation and Configuration
E: About the
Companion Web Site