Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Hacking Exposed Web Applications, Second Edition Back Cover About Foreword Introduction
How This Book Is Organized Online Resources And Tools A Final Word To Our Readers
Chapter 1: Hacking Web Apps 101
Resources References And Further Reading Summary How Are Web APPS Attacked? Who, When, And Where? Why Attack Web Applications?
Chapter 2: Profiling
Infrastructure Profiling References And Further Reading Summary General Countermeasures Application Profiling
Chapter 3: Hacking Web Platforms
Point-And-Click Exploitation Using Metasploit References And Further Reading Summary Web Platform Security Best Practices Evading Detection Manual Exploitation
Chapter 4: Web Authentication Attacking
Bypassing Authentication Some Final Thoughts: Identity Theft Summary References And Further Reading
Chapter 5: Attacking Web Authorization
Fingerprinting Authz Attacking Acls Attacking Tokens Authorization Attack Case Studies Authorization Best Practices Summary References And Further Reading
Chapter 6: Input Validation Attacks
Expect The Unexpected Where To Find Attack Vectors Bypass Client-Side Validation Routines Common Input Validation Attacks Summary References And Further Reading
Chapter 7: Attacking Web Datastores
SQL Primer SQL Injection Discovery Exploit SQL Injection Vulnerabilities Other Datastore Attacks Summary
Chapter 8: Attacking XML Web Services
What Is A Web Service? Attacking Web Services Web Service Security Basics Summary References And Further Reading
Chapter 9: Attacking Web Application Management
Remote Server Management Web Content Management Admin Misconfigurations Developer-Driven Mistakes Summary References And Further Reading
Chapter 10: Hacking Web Clients
Exploits Trickery General Countermeasures Summary References And Further Reading
Chapter 11: Denial-of-Service (DoS) Attacks
Common Dos Attack Techniques General Dos Countermeasures Summary References And Further Reading
Chapter 12: Full-Knowledge Analysis
Threat Modeling Rank The Threats Code Review Security Testing Of Web App Code Security In The Web Development Process Summary References And Further Reading
Chapter 13: Web Application Security Scanners
Technology: Web App Security Scanners Nontechnical Issues Summary References And Further Reading
Appendix A: Web Application Security Checklist Appendix B: Web Hacking Tools and Techniques Cribsheet Appendix C: URLScan and ModSecurity
Urlscan Modsecurity Summary References And Further Reading
Appendix D: About the Companion Web Site Index
B C D E F G H I J K L M N O P Q R S T U V W X Z
List of Figures List of Tables
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion