• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications

ISBN-13: 9781484253908 / Angielski / Miękka / 2019 / 225 str.

Sanjib Sinha
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications Sinha, Sanjib 9781484253908 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications

ISBN-13: 9781484253908 / Angielski / Miękka / 2019 / 225 str.

Sanjib Sinha
cena 211,32
(netto: 201,26 VAT:  5%)

Najniższa cena z 30 dni: 210,17
Termin realizacji zamówienia:
ok. 16-18 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Computers > Programming - Open Source
Business & Economics > Information Management
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484253908
Rok wydania:
2019
Ilość stron:
225
Waga:
0.34 kg
Wymiary:
23.39 x 15.6 x 1.3
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1: Let the Hunt Begin!
Chapter Goal: This chapter will showcase how to implement an offensive approach to hunt bugs. And what type of tools are required?
No of pages: 10

Sub -Topics
1. Why hunt bugs?
2. Introducing Burp Suite
3. Introducing other tools

Chapter 2: Setting up Your Virtual Lab
Chapter Goal: This chapter will guide readers with the goal to set up the virtual labs.
No of pages: 10

Sub - Topics
1. Why we need Virtual Box
2. Introduction to Kali Linux – the hacker’s operating system
3. What type of tools are available in Kali

Chapter 3: Injecting Request Forgery
Chapter Goal: Readers will learn to create and manage request forgery on any web page.
No of pages: 10

Sub - Topics:
1. What is Request Forgery (CSRF)
2. Mission Critical Injection of CSRF
3. How to discover CSRF on any application

Chapter 4: Cross Site Scripting (XSS) Exploitation
Chapter Goal: This chapter will talk, comprehensively, about one of the most challenging tasks of any web application – to resist Cross Site Scripting or XSS Attacks.
No of pages: 15

Sub - Topics:
1. What is XSS
2. How we can exploit through XSS
3. How we can discover any XSS attack

Chapter 5: Header Injection and URL Redirection
Chapter Goal: This chapter will discuss header injection, cache poisoning, and URL redirection.
No of pages: 15

Sub - Topics:
1. What is header injection and how it is related to URL redirection
2. How Cross Site Scripting is done through Header Injection
3. How to discover header has been injected
4. How to find URL redirection vulnerabilities

Chapter 6: Uploading Malicious Files
Chapter Goal: Readers will learn about malicious file uploading and take forward bug bounty hunting.
No of pages: 10

Sub - Topics:
1. How to upload malicious files to own a system
2. What is defacement?
3. How to automate this attack?

Chapter 7: Poisoning Sender Policy Framework (SPF)
Chapter Goal: This chapter will cover basic and advanced technique to test SPF and exploit it.
No of pages: 10

Sub - Topics:
1. Is there insufficient SPF records
2. How to exploit SPF
3. How to find the vulnerabilities and test it

Chapter 8: Injecting Unintended XML
Chapter Goal: Readers will learn about injecting unintended XML into any application.
No of pages: 10

Sub - Topics:
1. What is XML injection
2. How to perform XML injection in Virtual Lab
3. How to fetch System Configuration Files

Chapter 9: Command Injection
Chapter Goal: Readers will learn how an operating system falls prey to injected command and how attackers feed on those vulnerabilities.
No of pages: 10

Sub - Topics:
1. What is command injection
2. How to inject malicious commands
3. How to exploit command injection

Chapter 10: Exploiting HTML and SQL Injection
Chapter Goal: This chapter will teach readers the different attack vectors used to exploit HTML and SQL injection.
No of pages: 20

Sub - Topics:
1. What are HTML and SQL injection
2. How to find and exploit HTML injection
3. What are the header and cookie-based SQL injection
4. How to bypass authentication by SQLI
5. How to automate SQLI

Appendix: Further Reading
Chapter Goal: This section will show readers additional new features of bug hunting and how to exploit them.
No of pages: 10

Sub - Topics:
1. What tools can be used alongside Burp Suite
2. How source code disclosure helps information gathering
3. What could be the next challenges to hunt bugs

Sanjib Sinha is an author and tech writer. Being a certified .NET Windows and web developer, he has specialized in Python security programming, Linux, and many programming languages that include C#, PHP, Python, Dart, Java, and JavaScript. Sanjib has also won Microsoft's Community Contributor Award in 2011 and he has written Beginning Ethical Hacking with Python, Beginning Ethical Hacking with Kali Linux, and two editions of Beginning Laravel for Apress.

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. 

 

You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF),you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications.

 

You will:

  • Implement an offensive approach to bug hunting
  • Create and manage request forgery on web pages
  • Poison Sender Policy Framework and exploit it
  • Defend against cross-site scripting (XSS) attacks 
  • Inject headers and test URL redirection
  • Work with malicious files and command injection
  • Resist strongly unintended XML attacks 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia