舉報

會員
Web Penetration Testing with Kali Linux(Second Edition)
最新章節:
Index
Ifyouarealreadyworkingasanetworkpenetrationtesterandwanttoexpandyourknowledgeofwebapplicationhacking,thenthisbooktailoredforyou.ThosewhoareinterestedinlearningmoreabouttheKaliSanatoolsthatareusedtotestwebapplicationswillfindthisbookathoroughlyusefulandinterestingguide.
目錄(74章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Penetration Testing and Web Applications
- Proactive security testing
- Rules of engagement
- The limitations of penetration testing
- The need for testing web applications
- Social engineering attacks
- A web application overview for penetration testers
- Summary
- Chapter 2. Setting up Your Lab with Kali Linux
- Kali Linux
- Important tools in Kali Linux
- Using Tor for penetration testing
- Summary
- Chapter 3. Reconnaissance and Profiling the Web Server
- Reconnaissance
- Scanning – probing the target
- Summary
- Chapter 4. Major Flaws in Web Applications
- Information leakage
- Authentication issues
- Path traversal
- Injection-based flaws
- Cross-site scripting
- Cross-site request forgery
- Session-based flaws
- File inclusion vulnerability
- HTTP parameter pollution
- HTTP response splitting
- Summary
- Chapter 5. Attacking the Server Using Injection-based Flaws
- Command injection
- SQL injection
- Summary
- Chapter 6. Exploiting Clients Using XSS and CSRF Flaws
- The origin of cross-site scripting
- An overview of cross-site scripting
- Types of cross-site scripting
- XSS and JavaScript – a deadly combination
- Scanning for XSS flaws
- Cross-site request forgery
- Summary
- Chapter 7. Attacking SSL-based Websites
- Secure socket layer
- Summary
- Chapter 8. Exploiting the Client Using Attack Frameworks
- Social engineering attacks
- Social engineering toolkit
- Spear-phishing attack
- Website attack
- Browser exploitation framework
- Summary
- Chapter 9. AJAX and Web Services – Security Issues
- Introduction to AJAX
- Web services
- Summary
- Chapter 10. Fuzzing Web Applications
- Fuzzing basics
- Types of fuzzing techniques
- Summary
- Index 更新時間:2021-07-30 10:26:52
推薦閱讀
- Android Wearable Programming
- Learning Microsoft Windows Server 2012 Dynamic Access Control
- Visual C++程序設計學習筆記
- Learning SAP Analytics Cloud
- 信息安全技術
- Python 3破冰人工智能:從入門到實戰
- Python機器學習編程與實戰
- Python機器學習算法: 原理、實現與案例
- 用案例學Java Web整合開發
- 小程序,巧應用:微信小程序開發實戰(第2版)
- Nagios Core Administration Cookbook(Second Edition)
- C語言從入門到精通
- Learning Concurrency in Python
- Monitoring Docker
- Beginning C# 7 Hands-On:The Core Language
- 三步學Python
- 信息安全技術(第2版)
- 數據結構案例教程:C語言版
- HTML5與CSS3權威指南(第2版·下冊)
- 云原生基礎架構:構建和管理現代可擴展基礎架構的模式及實踐
- C語言開發手冊
- Perl語言IC設計實踐
- Apache Kafka Cookbook
- iOS開發項目化經典教程
- Python高級編程(第2版)
- Python網絡爬蟲實戰(第2版)
- Getting Started with PhantomJS
- GameMaker Cookbook
- Learning Azure Functions
- Gambas高級程序設計:基于國產操作系統