Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Contents
The Web Application Hacker's Handbook
Chapter 1: Web Application (In)security
The Evolution of Web Applications
Web Application Security
Summary
Chapter 2: Core Defense Mechanisms
Handling User Access
Handling User Input
Handling Attackers
Managing the Application
Summary
Questions
Chapter 3: Web Application Technologies
The HTTP Protocol
Web Functionality
Encoding Schemes
Next Steps
Questions
Chapter 4: Mapping the Application
Enumerating Content and Functionality
Analyzing the Application
Summary
Questions
Chapter 5: Bypassing Client-Side Controls
Transmitting Data Via the Client
Capturing User Data: HTML Forms
Capturing User Data: Browser Extensions
Handling Client-Side Data Securely
Summary
Questions
Chapter 6: Attacking Authentication
Authentication Technologies
Design Flaws in Authentication Mechanisms
Implementation Flaws in Authentication
Securing Authentication
Summary
Questions
Chapter 7: Attacking Session Management
The Need for State
Weaknesses in Token Generation
Weaknesses in Session Token Handling
Securing Session Management
Summary
Questions
Chapter 8: Attacking Access Controls
Common Vulnerabilities
Attacking Access Controls
Securing Access Controls
Summary
Questions
Chapter 9: Attacking Data Stores
Injecting into Interpreted Contexts
Injecting into SQL
Injecting into NoSQL
Injecting into XPath
Injecting into LDAP
Summary
Questions
Chapter 10: Attacking Back-End Components
Injecting OS Commands
Manipulating File Paths
Injecting into XML Interpreters
Injecting into Back-end HTTP Requests
Injecting into Mail Services
Summary
Questions
Chapter 11: Attacking Application Logic
The Nature of Logic Flaws
Real-World Logic Flaws
Avoiding Logic Flaws
Summary
Questions
Chapter 12: Attacking Users: Cross-Site Scripting
Varieties of XSS
XSS Attacks in Action
Finding and Exploiting XSS Vulnerabilities
Preventing XSS Attacks
Summary
Questions
Chapter 13: Attacking Users: Other Techniques
Inducing User Actions
Capturing Data Cross-Domain
The Same-Origin Policy Revisited
Other Client-Side Injection Attacks
Local Privacy Attacks
Attacking ActiveX Controls
Attacking the Browser
Summary
Questions
Chapter 14: Automating Customized Attacks
Uses for Customized Automation
Enumerating Valid Identifiers
Harvesting Useful Data
Fuzzing for Common Vulnerabilities
Putting It All Together: Burp Intruder
Barriers to Automation
Summary
Questions
Chapter 15: Exploiting Information Disclosure
Exploiting Error Messages
Gathering Published Information
Using Inference
Preventing Information Leakage
Summary
Questions
Chapter 16: Attacking Native Compiled Applications
Buffer Overflow Vulnerabilities
Integer Vulnerabilities
Format String Vulnerabilities
Summary
Questions
Chapter 17: Attacking Application Architecture
Tiered Architectures
Shared Hosting and Application Service Providers
Summary
Questions
Chapter 18: Attacking the Application Server
Vulnerable Server Configuration
Vulnerable Server Software
Web Application Firewalls
Summary
Questions
Chapter 19: Finding Vulnerabilities in Source Code
Approaches to Code Review
Signatures of Common Vulnerabilities
The Java Platform
ASP.NET
PHP
Perl
JavaScript
Database Code Components
Tools for Code Browsing
Summary
Questions
Chapter 20: A Web Application Hacker's Toolkit
Web Browsers
Integrated Testing Suites
Standalone Vulnerability Scanners
Other Tools
Summary
Chapter 21: A Web Application Hacker's Methodology
General Guidelines
1 Map the Application's Content
2 Analyze the Application
3 Test Client-Side Controls
4 Test the Authentication Mechanism
5 Test the Session Management Mechanism
6 Test Access Controls
7 Test for Input-Based Vulnerabilities
8 Test for Function-Specific Input Vulnerabilities
9 Test for Logic Flaws
10 Test for Shared Hosting Vulnerabilities
11 Test for Application Server Vulnerabilities
12 Miscellaneous Checks
13 Follow Up Any Information Leakage
Introduction
Malware Analyst's Cookbook and DVD
Title Page
Copyright
Dedication
About the Authors
Acknowledgments
Introduction
Who Should Read This Book
How This Book Is Organized
Setting Up Your Environment
Conventions
On The Book’s DVD
Chapter 1: Anonymizing Your Activities
The Onion Router (Tor)
Malware Research with Tor
Tor Pitfalls
Proxy Servers and Protocols
Web-Based Anonymizers
Alternate Ways to Stay Anonymous
Cellular Internet Connections
Virtual Private Networks
Being Unique and Not Getting Busted
Chapter 2: Honeypots
Nepenthes Honeypots
Working with Dionaea Honeypots
Chapter 3: Malware Classification
Classification with ClamAV
Classification with YARA
Putting It All Together
Chapter 4: Sandboxes and Multi-AV Scanners
Public Antivirus Scanners
Multi-Antivirus Scanner Comparison
Public Sandbox Analysis
Chapter 5: Researching Domains and IP Addresses
Researching Suspicious Domains
Researching IP Addresses
Researching with Passive DNS and Other Tools
Fast Flux Domains
Geo-Mapping IP Addresses
Chapter 6: Documents, Shellcode, and URLs
Analyzing JavaScript
Analyzing PDF Documents
Analyzing Malicious Office Documents
Analyzing Network Traffic
Chapter 7: Malware Labs
Networking
Physical Targets
Chapter 8: Automation
The Analysis Cycle
Automation with Python
Adding Analysis Modules
Miscellaneous Systems
Chapter 9: Dynamic Analysis
API Monitoring/Hooking
Data Preservation
Chapter 10: Malware Forensics
The Sleuth Kit (TSK)
Forensic/Incident Response Grab Bag
Registry Analysis
Chapter 11: Debugging Malware
Working with Debuggers
Immunity Debugger’s Python API
WinAppDbg Python Debugger
Chapter 12: De-obfuscation
Decoding Common Algorithms
Decryption
Unpacking Malware
Unpacking Resources
Debugger Scripting
Chapter 13: Working with DLLs
Chapter 14: Kernel Debugging
Remote Kernel Debugging
Local Kernel Debugging
Software Requirements
Chapter 15: Memory Forensics with Volatility
Memory Acquisition
Preparing a Volatility Install
Chapter 16: Memory Forensics: Code Injection and Extraction
Investigating DLLs
Code Injection and the VAD
Reconstructing Binaries
Chapter 17: Memory Forensics: Rootkits
Chapter 18: Memory Forensics: Network and Registry
Registry Analysis
Index
Wiley Publishing, Inc. End-User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →