Scott White—Technical Reviewer
Chapter 1. The Basics of Web Hacking
What You Need to Know About Web Servers
What You Need to Know About HTTP
The Basics of Web Hacking: Our Approach
Web Apps Touch Every Part of IT
Most Common Web Vulnerabilities
Chapter 3. Web Application Recon and Scanning
Chapter 4. Web Application Exploitation with Injection
Operating System Command Injection Vulnerabilities
Operating System Command Injection Attacks
Chapter 5. Web Application Exploitation with Broken Authentication and Path Traversal
Authentication and Session Vulnerabilities
Path Traversal Vulnerabilities
Brute Force Authentication Attacks
Cross-Site Scripting (XSS) Vulnerabilities
Cross-Site Request Forgery (CSRF) Vulnerabilities
Technical Social Engineering Vulnerabilities
Cross-Site Scripting (XSS) Attacks
Cross-Site Request Forgery (CSRF) Attacks