𝔖 Bobbio Scriptorium
✦   LIBER   ✦

The Basics of Web Hacking || The Basics of Web Hacking

✍ Scribed by Pauli, Josh


Book ID
121797479
Publisher
Elsevier
Year
2013
Tongue
English
Weight
971 KB
Edition
1
Category
Article
ISBN
0124166008

No coin nor oath required. For personal study only.

✦ Synopsis


The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.

The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.

With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.

  • Provides a simple and clean approach to Web hacking, including hands-on examples and exercises that are designed to teach you how to hack the server, hack the Web app, and hack the Web user
  • Covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more!
  • Written by an author who works in the field as a penetration tester and who teaches Web security classes at Dakota State University

πŸ“œ SIMILAR VOLUMES


The Basics of Hacking and Penetration Te
✍ Engebretson, Patrick πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier 🌐 English βš– 758 KB

*The Basics of Hacking and Penetration Testing* serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool

Hacking the Code: ASP.NET Web Applicatio
✍ Mark Burnett πŸ“‚ Library πŸ“… 2004 πŸ› Syngress 🌐 English βš– 5 MB

More of a programmer's guide than a security guide, Hacking the Code explains how certain code can be attacked, shows how you should edit the code, and offers case studies and examples for doing so. The book establishes policies for object input, and shows how to audit existing code for potential se

Hacking the Code: ASP.NET Web Applicatio
✍ Mark Burnett πŸ“‚ Library πŸ“… 2004 πŸ› Syngress 🌐 English βš– 5 MB

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Prev

Hacking the Code: ASP.NET Web Applicatio
✍ Mark Burnett πŸ“‚ Library πŸ“… 2004 πŸ› Syngress 🌐 English βš– 5 MB

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Prev