首頁 > 計(jì)算機(jī)網(wǎng)絡(luò) >
編程語言與程序設(shè)計(jì)
> Kali Linux Web Penetration Testing Cookbook最新章節(jié)目錄
舉報(bào)

會(huì)員
Kali Linux Web Penetration Testing Cookbook
最新章節(jié):
Index
ThisbookisforITprofessionals,webdevelopers,securityenthusiasts,andsecurityprofessionalswhowantanaccessiblereferenceonhowtofind,exploit,andpreventsecurityvulnerabilitiesinwebapplications.YoushouldknowthebasicsofoperatingaLinuxenvironmentandhavesomeexposuretosecuritytechnologiesandtools.
目錄(111章)
倒序
- 封面
- 版權(quán)信息
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Setting Up Kali Linux
- Introduction
- Updating and upgrading Kali Linux
- Installing and running OWASP Mantra
- Setting up the Iceweasel browser
- Installing VirtualBox
- Creating a vulnerable virtual machine
- Creating a client virtual machine
- Configuring virtual machines for correct communication
- Getting to know web applications on a vulnerable VM
- Chapter 2. Reconnaissance
- Introduction
- Scanning and identifying services with Nmap
- Identifying a web application firewall
- Watching the source code
- Using Firebug to analyze and alter basic behavior
- Obtaining and modifying cookies
- Taking advantage of robots.txt
- Finding files and folders with DirBuster
- Password profiling with CeWL
- Using John the Ripper to generate a dictionary
- Finding files and folders with ZAP
- Chapter 3. Crawlers and Spiders
- Introduction
- Downloading a page for offline analysis with Wget
- Downloading the page for offline analysis with HTTrack
- Using ZAP's spider
- Using Burp Suite to crawl a website
- Repeating requests with Burp's repeater
- Using WebScarab
- Identifying relevant files and directories from crawling results
- Chapter 4. Finding Vulnerabilities
- Introduction
- Using Hackbar add-on to ease parameter probing
- Using Tamper Data add-on to intercept and modify requests
- Using ZAP to view and alter requests
- Using Burp Suite to view and alter requests
- Identifying cross-site scripting (XSS) vulnerabilities
- Identifying error based SQL injection
- Identifying a blind SQL Injection
- Identifying vulnerabilities in cookies
- Obtaining SSL and TLS information with SSLScan
- Looking for file inclusions
- Identifying POODLE vulnerability
- Chapter 5. Automated Scanners
- Introduction
- Scanning with Nikto
- Finding vulnerabilities with Wapiti
- Using OWASP ZAP to scan for vulnerabilities
- Scanning with w3af
- Using Vega scanner
- Finding Web vulnerabilities with Metasploit's Wmap
- Chapter 6. Exploitation – Low Hanging Fruits
- Introduction
- Abusing file inclusions and uploads
- Exploiting OS Command Injections
- Exploiting an XML External Entity Injection
- Brute-forcing passwords with THC-Hydra
- Dictionary attacks on login pages with Burp Suite
- Obtaining session cookies through XSS
- Step by step basic SQL Injection
- Finding and exploiting SQL Injections with SQLMap
- Attacking Tomcat's passwords with Metasploit
- Using Tomcat Manager to execute code
- Chapter 7. Advanced Exploitation
- Introduction
- Searching Exploit-DB for a web server's vulnerabilities
- Exploiting Heartbleed vulnerability
- Exploiting XSS with BeEF
- Exploiting a Blind SQLi
- Using SQLMap to get database information
- Performing a cross-site request forgery attack
- Executing commands with Shellshock
- Cracking password hashes with John the Ripper by using a dictionary
- Cracking password hashes by brute force using oclHashcat/cudaHashcat
- Chapter 8. Man in the Middle Attacks
- Introduction
- Setting up a spoofing attack with Ettercap
- Being the MITM and capturing traffic with Wireshark
- Modifying data between the server and the client
- Setting up an SSL MITM attack
- Obtaining SSL data with SSLsplit
- Performing DNS spoofing and redirecting traffic
- Chapter 9. Client-Side Attacks and Social Engineering
- Introduction
- Creating a password harvester with SET
- Using previously saved pages to create a phishing site
- Creating a reverse shell with Metasploit and capturing its connections
- Using Metasploit's browser_autpwn2 to attack a client
- Attacking with BeEF
- Tricking the user to go to our fake site
- Chapter 10. Mitigation of OWASP Top 10
- Introduction
- A1 – Preventing injection attacks
- A2 – Building proper authentication and session management
- A3 – Preventing cross-site scripting
- A4 – Preventing Insecure Direct Object References
- A5 – Basic security configuration guide
- A6 – Protecting sensitive data
- A7 – Ensuring function level access control
- A8 – Preventing CSRF
- A9 – Where to look for known vulnerabilities on third-party components
- A10 – Redirect validation
- Index 更新時(shí)間:2021-07-16 12:54:15
推薦閱讀
- Designing Machine Learning Systems with Python
- Oracle WebLogic Server 12c:First Look
- Advanced Machine Learning with Python
- 構(gòu)建移動(dòng)網(wǎng)站與APP:HTML 5移動(dòng)開發(fā)入門與實(shí)戰(zhàn)(跨平臺(tái)移動(dòng)開發(fā)叢書)
- Mastering Ember.js
- Java技術(shù)手冊(cè)(原書第7版)
- Vue.js 3.0源碼解析(微課視頻版)
- Hands-On Reinforcement Learning with Python
- 一塊面包板玩轉(zhuǎn)Arduino編程
- Programming with CodeIgniterMVC
- Python青少年趣味編程
- Java RESTful Web Service實(shí)戰(zhàn)
- Clojure Data Structures and Algorithms Cookbook
- Mobile Test Automation with Appium
- 流程讓管理更高效:流程管理全套方案制作、設(shè)計(jì)與優(yōu)化
- Python自動(dòng)化開發(fā)實(shí)戰(zhàn)
- 零基礎(chǔ)入門Python數(shù)據(jù)分析與機(jī)器學(xué)習(xí)
- ReactJS Blueprints
- jQuery Mobile從入門到精通
- Java程序員面試筆試真題庫
- 微信小程序開發(fā)零基礎(chǔ)入門
- 我的第一堂編程課:孩子和家長(zhǎng)都需要的編程思維
- Python算法設(shè)計(jì)與分析
- 青少年學(xué)三維圖形化編程
- 40 Algorithms Every Programmer Should Know
- 跨平臺(tái)的移動(dòng)Web開發(fā)實(shí)戰(zhàn)(HTML5+CSS3)
- Python與數(shù)據(jù)科學(xué)
- SproutCore Web Application Development
- HTML+CSS網(wǎng)頁開發(fā)技術(shù)精解
- ScratchJr編程趣味卡:孩子們也能輕松掌握創(chuàng)意編程