𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Bug Bounty Hunting For Web Security: Find And Exploit Vulnerabilities In Web Sites And Applications

✍ Scribed by Sanjib Sinha


Publisher
Apress/Springer
Year
2019
Tongue
English
Leaves
232
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn: Implement an offensive approach to bug hunting. Create and manage request forgery on web pages. Poison Sender Policy Framework and exploit it. Defend against cross-site scripting (XSS) attacks. Inject headers and test URL redirection. Work with malicious files and command injection. Resist strongly unintended XML attacks. Who This Book Is For: White-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.

✦ Table of Contents


Front Matter ....Pages i-xvi
Introduction to Hunting Bugs (Sanjib Sinha)....Pages 1-5
Setting Up Your Environment (Sanjib Sinha)....Pages 7-35
How to Inject Request Forgery (Sanjib Sinha)....Pages 37-55
How to Exploit Through Cross-Site Scripting (XSS) (Sanjib Sinha)....Pages 57-78
Header Injection and URL Redirection (Sanjib Sinha)....Pages 79-96
Malicious Files (Sanjib Sinha)....Pages 97-114
Poisoning Sender Policy Framework (Sanjib Sinha)....Pages 115-122
Injecting Unintended XML (Sanjib Sinha)....Pages 123-146
Finding Command Injection Vulnerabilities (Sanjib Sinha)....Pages 147-165
Finding HTML and SQL Injection Vulnerabilities (Sanjib Sinha)....Pages 167-196
Back Matter ....Pages 197-225

✦ Subjects


Web Security, Web Sites, Exploit Vulnerabilitites


πŸ“œ SIMILAR VOLUMES


Bug Bounty Bootcamp: The Guide to Findin
✍ Vickie Li πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<div><div><b><i>Bug Bounty Bootcamp</i><i> </i>teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security pr

Bug Bounty Bootcamp: The Guide to Findin
✍ Vickie Li πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<div><div><b><i>Bug Bounty Bootcamp</i><i> </i>teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security pr

Bug Bounty Bootcamp: The Guide to Findin
✍ Vickie Li πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bug

Bug Bounty Bootcamp: The Guide to Findin
✍ Vickie Li πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<div><div><b><i>Bug Bounty Bootcamp</i><i> </i>teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security pr

Bug Bounty Bootcamp: The Guide to Findin
✍ Vickie Li πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bug

Web Application Security: Exploitation a
✍ Andrew Hoffman πŸ“‚ Library πŸ“… 2020 πŸ› O'Reilly Media 🌐 English

While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackingβ€”until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman,