|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910779756803321 |
|
|
Autore |
Pauli Joshua J |
|
|
Titolo |
The basics of web hacking : tools and techniques to attack the Web / / Josh Pauli ; Scott White, technical editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam, : Syngress, an imprint of Elsevier, 2013 |
|
Amsterdam ; ; Boston : , : Syngress, an imprint of Elsevier, , 2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xiii, 145 pages) : illustrations (some color) |
|
|
|
|
|
|
Collana |
|
The basics The basics of web hacking |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Web sites - Security measures |
Web applications - Security measures |
Computer networks - Security measures |
Penetration testing (Computer security) |
Computer hackers |
Computer crimes - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; The Basics of Web Hacking: Tools and Techniques to Attack the Web; Copyright; Dedication; Acknowledgments; Honey Bear; Lizard; Baby Bird; Family and Friends; Security Community; Scott White-Technical Reviewer; Syngress Team; My Vices; Biography; Foreword; Introduction; About this Book; A Hands-on Approach; What's in this Book?; A Quick Disclaimer; Contents; Chapter 1: The Basics of Web Hacking; Introduction; What Is a Web Application?; What You Need to Know About Web Servers; What You Need to Know About HTTP; HTTP Cycles; Noteworthy HTTP Headers; Noteworthy HTTP Status Codes |
The Basics of Web Hacking: Our ApproachOur Targets; Our Tools; Web Apps Touch Every Part of IT; Existing Methodologies; The Open-Source Security Testing Methodology Manual (OSSTM); Penetration Testing Execution Standard (PTES); Making Sense of Existing Methodologies; Most Common Web Vulnerabilities; Injection; Cross-site Scripting (XSS); Broken Authentication and Session Management; Cross-site Request Forgery; Security Misconfiguration; Setting Up a Test Environment; Target Web Application; Installing the Target Web Application; |
|
|
|
|