Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...

Full description

Bibliographic Details
Main Author: Sinha, Sanjib (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2019.
Edition:1st ed. 2019.
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 04044nam a2200481 4500
001 978-1-4842-5391-5
003 DE-He213
005 20191112160941.0
007 cr nn 008mamaa
008 191112s2019 xxu| s |||| 0|eng d
020 |a 9781484253915  |9 978-1-4842-5391-5 
024 7 |a 10.1007/978-1-4842-5391-5  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Sinha, Sanjib.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Bug Bounty Hunting for Web Security  |h [electronic resource] :  |b Find and Exploit Vulnerabilities in Web sites and Applications /  |c by Sanjib Sinha. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XVI, 225 p. 140 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Introduction to Hunting Bugs -- Chapter 2: Setting up Your Environment -- Chapter 3: How to inject Request Forgery -- Chapter 4: How to exploit through Cross Site Scripting (XSS) -- Chapter 5: Header Injection and URL Redirection -- Chapter 6: Malicious Files -- Chapter 7: Poisoning Sender Policy Framework (SPF) -- Chapter 8: Injecting Unintended XML -- Chapter 9: Finding Command Injection Vulnerabilities -- Chapter 10: Finding HTML and SQL Injection Vulnerabilities -- Appendix: Further Reading. 
520 |a Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF),you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. You will: Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injection Resist strongly unintended XML attacks . 
650 0 |a Data protection. 
650 0 |a Open source software. 
650 0 |a Computer programming. 
650 0 |a Management information systems. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Open Source.  |0 http://scigraph.springernature.com/things/product-market-codes/I29090 
650 2 4 |a Enterprise Architecture.  |0 http://scigraph.springernature.com/things/product-market-codes/522010 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484253908 
776 0 8 |i Printed edition:  |z 9781484253922 
856 4 0 |u https://doi.org/10.1007/978-1-4842-5391-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)