舉報

會員
Web Penetration Testing with Kali Linux(Second Edition)
最新章節:
Index
Ifyouarealreadyworkingasanetworkpenetrationtesterandwanttoexpandyourknowledgeofwebapplicationhacking,thenthisbooktailoredforyou.ThosewhoareinterestedinlearningmoreabouttheKaliSanatoolsthatareusedtotestwebapplicationswillfindthisbookathoroughlyusefulandinterestingguide.
目錄(74章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Penetration Testing and Web Applications
- Proactive security testing
- Rules of engagement
- The limitations of penetration testing
- The need for testing web applications
- Social engineering attacks
- A web application overview for penetration testers
- Summary
- Chapter 2. Setting up Your Lab with Kali Linux
- Kali Linux
- Important tools in Kali Linux
- Using Tor for penetration testing
- Summary
- Chapter 3. Reconnaissance and Profiling the Web Server
- Reconnaissance
- Scanning – probing the target
- Summary
- Chapter 4. Major Flaws in Web Applications
- Information leakage
- Authentication issues
- Path traversal
- Injection-based flaws
- Cross-site scripting
- Cross-site request forgery
- Session-based flaws
- File inclusion vulnerability
- HTTP parameter pollution
- HTTP response splitting
- Summary
- Chapter 5. Attacking the Server Using Injection-based Flaws
- Command injection
- SQL injection
- Summary
- Chapter 6. Exploiting Clients Using XSS and CSRF Flaws
- The origin of cross-site scripting
- An overview of cross-site scripting
- Types of cross-site scripting
- XSS and JavaScript – a deadly combination
- Scanning for XSS flaws
- Cross-site request forgery
- Summary
- Chapter 7. Attacking SSL-based Websites
- Secure socket layer
- Summary
- Chapter 8. Exploiting the Client Using Attack Frameworks
- Social engineering attacks
- Social engineering toolkit
- Spear-phishing attack
- Website attack
- Browser exploitation framework
- Summary
- Chapter 9. AJAX and Web Services – Security Issues
- Introduction to AJAX
- Web services
- Summary
- Chapter 10. Fuzzing Web Applications
- Fuzzing basics
- Types of fuzzing techniques
- Summary
- Index 更新時間:2021-07-30 10:26:52
推薦閱讀
- HTML5移動Web開發技術
- Boost C++ Application Development Cookbook(Second Edition)
- PyTorch Artificial Intelligence Fundamentals
- Unity Shader入門精要
- Java Web程序設計任務教程
- 網站構建技術
- C語言程序設計教程
- INSTANT Yii 1.1 Application Development Starter
- Statistical Application Development with R and Python(Second Edition)
- JBoss:Developer's Guide
- 編程可以很簡單
- Learning Jakarta Struts 1.2: a concise and practical tutorial
- Developer,Advocate!
- C#程序開發參考手冊
- JavaScript重難點實例精講
- Mastering Assembly Programming
- 面向對象程序設計及C++實驗指導(第3版)
- Learning Unreal? Engine iOS Game Development
- Helm學習指南:Kubernetes上的應用程序管理
- 學習JavaScript數據結構與算法(第3版)
- 零基礎學Python編程實戰
- 基于YANG的可編程網絡:用YANG、NETCONF、RESTCONF和gNMI實現網絡自動化架構
- 大學信息基礎
- Julia High Performance
- Clojure Data Analysis Cookbook(Second Edition)
- 編寫整潔的Python代碼
- 明解C++
- 青少年人工智能編程:光環板玩轉慧編程mBlock
- 程序員代碼面試指南:IT名企算法與數據結構題目最優解(第2版)
- Mastering Swift 3