"Sinopsis" puede pertenecer a otra edición de este libro.
"...this book does provide an excellent introduction to the subject, and does so in a very practical way that explains the issues and techniques very clearly. Even if you’re not interested in becoming a hacker (or penetration tester) it’s a worthwhile read if you want to understand the problem..."--Network Security,August 1 2013
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.
The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.
With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
"Sobre este título" puede pertenecer a otra edición de este libro.
Gastos de envío:
EUR 3,74
A Estados Unidos de America
Descripción Paperback. Condición: new. New. Fast Shipping and good customer service. Nº de ref. del artículo: Holz_New_0124166008
Descripción Paperback. Condición: new. New. Nº de ref. del artículo: Wizard0124166008
Descripción Condición: New. Nº de ref. del artículo: 19756666-n
Descripción Paperback. Condición: new. New Copy. Customer Service Guaranteed. Nº de ref. del artículo: think0124166008
Descripción Condición: new. Nº de ref. del artículo: FrontCover0124166008
Descripción Paperback. Condición: Brand New. 1st edition. 160 pages. 9.10x7.40x0.50 inches. In Stock. Nº de ref. del artículo: __0124166008
Descripción Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers. Nº de ref. del artículo: B9780124166004
Descripción Condición: new. Questo è un articolo print on demand. Nº de ref. del artículo: 407150acfa380b7c002e715981df8685
Descripción Paperback. Condición: New. Nº de ref. del artículo: 6666-ELS-9780124166004
Descripción Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Nº de ref. del artículo: ria9780124166004_lsuk