Skip to content

Web Application Hacker's Handbook Finding and Exploiting Security Flaws

Best in textbook rentals since 2012!

ISBN-10: 1118026470

ISBN-13: 9781118026472

Edition: 2nd 2011

Authors: Dafydd Stuttard, Marcus Pinto

List price: $46.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

There have been two broad trends that have evolved since the first edition and will be covered in detail in this edition: Various new and modified technologies have appeared that are being used in web applications, including new remoting frameworks, HTML5, cross-domain integration techniques. Many new attack techniques have been developed, particularly in relation to the client side, including UI redress (clickjacking), framebusting, HTTP parameter pollution, XML external entity injection, bypasses for new browser anti-XSS filters, hybrid file (GIFAR) attacks. The web site to accompany the book will comprise: Code appearing in the book. Answers to the questions posed at the end of each…    
Customers also bought

Book details

List price: $46.00
Edition: 2nd
Copyright year: 2011
Publisher: John Wiley & Sons, Limited
Publication date: 10/7/2011
Binding: Paperback
Pages: 912
Size: 7.30" wide x 9.20" long x 2.10" tall
Weight: 2.970
Language: English

Introduction
Web Application (In)security
Core Defense Mechanisms
Web Application Technologies
Mapping the Application
Bypassing Client-Side Controls
Attacking Authentication
Attacking Session Management
Attacking Access Controls
Attacking Data Stores
Attacking Back-End Components
Attacking Application Logic
Attacking Users: Cross-Site Scripting
Attacking Users: Other Techniques
Automating Customized Attacks
Exploiting Information Disclosure
Attacking Native Compiled Applications
Attacking Application Architecture
Attacking the Application Server
Finding Vulnerabilities in Source Code
A Web Application Hacker's Toolkit
A Web Application Hacker's Methodology
Index