
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by Dafydd Stuttard; Marcus Pinto-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Table of Contents
Acknowledgments | |
Introduction | |
Web Application (In)security | |
Core Defense Mechanisms | |
Web Application Technologies | |
Mapping the Application | |
Bypassing Client-Side Controls | |
Attacking Authentication | |
Attacking Session Management | |
Attacking Access Controls | |
Injecting Code | |
Exploiting Path Traversal | |
Attacking Application Logic | |
Attacking Other Users | |
Automating Bespoke Attacks | |
Exploiting Information Disclosure | |
Attacking Compiled Applications | |
Attacking Application Architecture | |
Attacking the Web Server | |
Finding Vulnerabilities in Source Code | |
A Web Application Hacker's Toolkit | |
A Web Application Hacker's Methodology | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.