Web Application Hacker's Handbook Finding and Exploiting Security Flaws
Edition: 2nd 2011
List price: $42.50
Buy it from $23.96
Rent it from $39.98
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: There have been two broad trends that have evolved since the first edition and will be covered in detail in this edition: Various new and modified technologies have appeared that are being used in web applications, including new remoting frameworks, HTML5, cross-domain integration techniques. Many new attack techniques have been developed, particularly in relation to the client side, including UI redress (clickjacking), framebusting, HTTP parameter pollution, XML external entity injection, bypasses for new browser anti-XSS filters, hybrid file (GIFAR) attacks. The web site to accompany the book will comprise: Code appearing in the book. Answers to the questions posed at the end of each chapter. Links to tools discussed in the book. A summarized methodology and checklist of tasks For several years the authors have delivered a very popular course on web application hacking at venues around the world, and they are constantly being asked to create an online version of the course for people who aren't able to attend conferences. The authors will make parts of their existing course available online on a subscription basis in the coming months. They will use some examples from the online course within this second edition of the book, so that (in contrast to the first edition which uses purely fictional examples), people who wish to practice on the examples in the book will be able to do so if they wish. While there will be 25% new material and 25% revisions to existing materials, the reason for the amount of unmodified material is that a substantial part of the accumulated knowledge within web application security is timeless in character and has not materially altered for many years. This applies both to technology-agnostic design issues affecting areas like authentication and business logic, and also to many technology-specific areas such as code injection. In the latter case, developments in recent years have been relatively incremental, and consist of minor variations on existing techniques, or the application of existing techniques to updated technologies. The bulk of the first edition of WAHH could in fact have been written five years previously, and this "classic" material does not need updating. Rather, the focus for changes in the second edition will be on the areas of web application security where things have moved on in recent years, in relation to new technologies and attack techniques, primarily on the client-side.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $42.50
Copyright year: 2011
Publisher: John Wiley & Sons, Limited
Publication date: 10/7/2011
Size: 7.50" wide x 9.50" long x 2.00" tall
|Web Application (In)security|
|Core Defense Mechanisms|
|Web Application Technologies|
|Mapping the Application|
|Bypassing Client-Side Controls|
|Attacking Session Management|
|Attacking Access Controls|
|Attacking Data Stores|
|Attacking Back-End Components|
|Attacking Application Logic|
|Attacking Users: Cross-Site Scripting|
|Attacking Users: Other Techniques|
|Automating Customized Attacks|
|Exploiting Information Disclosure|
|Attacking Native Compiled Applications|
|Attacking Application Architecture|
|Attacking the Application Server|
|Finding Vulnerabilities in Source Code|
|A Web Application Hacker's Toolkit|
|A Web Application Hacker's Methodology|