Ethical hacking and countermeasures. Book 3, Web applications and data servers
โ Scribed by EC-Council Press.; International Council of E-Commerce Consultants
- Publisher
- Cengage Learning
- Year
- 2016;2017
- Tongue
- English
- Leaves
- 209
- Edition
- 2nd ed
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C-EH certification exam from EC-Council.
โฆ Table of Contents
Cover......Page 1
IFC......Page 2
Title......Page 3
Statement......Page 4
Copyright......Page 5
Brief Table of Contents......Page 6
Table of Contents......Page 8
Preface......Page 14
Acknowledgments......Page 20
Ch 1: After Completing This Chapter, You Should Be Able To:......Page 22
Ch 1: Introduction to Session Hijacking......Page 23
Session Hijacking......Page 24
Ch 1: Chapter Summary......Page 42
Ch 1: Review Questions......Page 43
Ch 1: Hands-On Projects......Page 45
Ch 2: After Completing This Chapter, You Should Be Able To:......Page 48
Ch 2: Introduction to Hacking Web Servers......Page 49
Sources of Security Vulnerabilities in Web Servers......Page 50
Web Site Defacement......Page 51
Attacks Against Internet Information Services......Page 52
IIS 7 Components......Page 54
Patch Management......Page 69
Vulnerability Scanners......Page 71
Ch 2: Review Questions......Page 80
Ch 2: Hands-On Projects......Page 82
Ch 3: After Completing This Chapter, You Should Be Able To:......Page 86
Web Applications......Page 87
Web Application Hacking......Page 89
Web Application Threats......Page 90
Web Application Hacking Tools......Page 106
Ch 3: Review Questions......Page 115
Ch 3: Hands-On Projects......Page 117
Ch 4: After Completing This Chapter, You Should Be Able To:......Page 120
Authentication......Page 121
Authentication Techniques......Page 122
Password Cracking......Page 129
Tools......Page 135
Ch 4: Key Terms......Page 146
Ch 4: Review Questions......Page 147
Ch 4: Hands-On Projects......Page 148
Ch 5: After Completing This Chapter, You Should Be Able To:......Page 150
Ch 5: Introduction to Hacking Web Browsers......Page 151
How Web Browsers Work......Page 152
Hacking Firefox......Page 153
Cookies......Page 154
Firefox Security......Page 155
Hacking Internet Explorer......Page 156
Internet Explorer Security......Page 157
Hacking Opera......Page 161
Hacking Safari......Page 162
Ch 5: Chapter Summary......Page 163
Ch 5: Review Questions......Page 164
Ch 5: Hands-On Projects......Page 166
Ch 6: After Completing This Chapter, You Should Be Able To:......Page 168
Ch 6: Introduction to SQL Injection......Page 169
Attacking Oracle......Page 170
Breaking into an Oracle Database......Page 171
OLE DB Errors......Page 172
Input Validation Attack......Page 176
SQL Injection Techniques......Page 177
How It Works......Page 180
SQL Injection in MySQL......Page 182
Hacking an SQL Server......Page 183
Attacks Against Microsoft SQL Server......Page 186
Tools for Automated SQL Injection......Page 188
SQL Injection Countermeasures......Page 192
Preventing SQL Injection Attacks......Page 193
Security Tools......Page 195
Security Checklists......Page 196
Ch 6: Chapter Summary......Page 198
Ch 6: Review Questions......Page 199
Ch 6: Hands-On Projects......Page 201
Glossary......Page 202
Index......Page 204
๐ SIMILAR VOLUMES
Ethical Hacking and Countermeasures Version 6 Module VII System Hacking Password Cracking Escalating Privileges Hiding Files Password Attacks Executing Applications Rootkits Password Cracking Tools Keyloggers and Spywares Steganography Password Cracking Countermeasures Coverin
<span>Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with nu
Course Technology, 2009. - 352 ั. ISBN: 143548360X<div class="bb-sep"></div>Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive envir
Course Technology, 2009. - 309 p. ISBN: 1435483618<div class="bb-sep"></div>This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and