The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Google eBook)
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.
What people are saying - Write a review
Review: The Web Application Hacker's Handbook: Finding and Exploiting Security FlawsUser Review - Goodreads
This is a necessary read for anyone looking to get a better idea of web application security, particularly those who haven't had a background in the security field at all. It's a long read, and not ...
Review: The Web Application Hacker's Handbook: Discovering and Exploiting Security FlawsUser Review - Goodreads
This one will stay front and center on my bookshelf. I'm strongly considering buying the print version. I read mine on safari bookshelf.
Core Defense Mechanisms
Web Application Technologies
Mapping the Application
Bypassing ClientSide Controls
Attacking Session Management
Attacking Access Controls
Exploiting Information Disclosure
Attacking Compiled Applications
Attacking Application Architecture
Attacking the Web Server
Finding Vulnerabilities in Source Code
The Java Platform
Injecting OS Commands
Injecting into SOAP
Exploiting Path Traversal
Attacking Application Logic
Attacking Other Users
HTTP Header Injection
Attacking ActiveX Controls
Automating Bespoke Attacks