舉報

會員
Web Penetration Testing with Kali Linux(Second Edition)
最新章節:
Index
Ifyouarealreadyworkingasanetworkpenetrationtesterandwanttoexpandyourknowledgeofwebapplicationhacking,thenthisbooktailoredforyou.ThosewhoareinterestedinlearningmoreabouttheKaliSanatoolsthatareusedtotestwebapplicationswillfindthisbookathoroughlyusefulandinterestingguide.
目錄(74章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Penetration Testing and Web Applications
- Proactive security testing
- Rules of engagement
- The limitations of penetration testing
- The need for testing web applications
- Social engineering attacks
- A web application overview for penetration testers
- Summary
- Chapter 2. Setting up Your Lab with Kali Linux
- Kali Linux
- Important tools in Kali Linux
- Using Tor for penetration testing
- Summary
- Chapter 3. Reconnaissance and Profiling the Web Server
- Reconnaissance
- Scanning – probing the target
- Summary
- Chapter 4. Major Flaws in Web Applications
- Information leakage
- Authentication issues
- Path traversal
- Injection-based flaws
- Cross-site scripting
- Cross-site request forgery
- Session-based flaws
- File inclusion vulnerability
- HTTP parameter pollution
- HTTP response splitting
- Summary
- Chapter 5. Attacking the Server Using Injection-based Flaws
- Command injection
- SQL injection
- Summary
- Chapter 6. Exploiting Clients Using XSS and CSRF Flaws
- The origin of cross-site scripting
- An overview of cross-site scripting
- Types of cross-site scripting
- XSS and JavaScript – a deadly combination
- Scanning for XSS flaws
- Cross-site request forgery
- Summary
- Chapter 7. Attacking SSL-based Websites
- Secure socket layer
- Summary
- Chapter 8. Exploiting the Client Using Attack Frameworks
- Social engineering attacks
- Social engineering toolkit
- Spear-phishing attack
- Website attack
- Browser exploitation framework
- Summary
- Chapter 9. AJAX and Web Services – Security Issues
- Introduction to AJAX
- Web services
- Summary
- Chapter 10. Fuzzing Web Applications
- Fuzzing basics
- Types of fuzzing techniques
- Summary
- Index 更新時間:2021-07-30 10:26:52
推薦閱讀
- 數據科學實戰手冊(R+Python)
- Learning Cython Programming(Second Edition)
- 程序設計與實踐(VB.NET)
- Learning Docker
- C++ Builder 6.0下OpenGL編程技術
- TypeScript圖形渲染實戰:基于WebGL的3D架構與實現
- Android 應用案例開發大全(第3版)
- 你不知道的JavaScript(中卷)
- Rust Essentials(Second Edition)
- 領域驅動設計:軟件核心復雜性應對之道(修訂版)
- 深入淺出React和Redux
- Mastering Apache Storm
- Learning Splunk Web Framework
- 精通Spring:Java Web開發與Spring Boot高級功能
- Oracle Database XE 11gR2 Jump Start Guide
- Python計算機視覺與深度學習實戰
- Web開發新體驗
- jQuery EasyUI從零開始學
- 看漫畫學Python:有趣、有料、好玩、好用(全彩版)
- 我跟爸爸學編程:從Python到C++
- 物聯網軟件架構設計與實現
- 從Scratch進階到Python(基礎篇)
- MariaDB Cookbook
- 學習JavaScript數據結構與算法(第3版)
- 移動終端應用創意與程序設計(2013版)
- Android App開發入門與實戰
- 系統辨識理論及Matlab仿真
- Mastering OpenCV 3(Second Edition)
- 算法小時代:從數學到生活的歷變
- Modern Web Development with ASP.NET Core 3