Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...
| Main Author: | |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2019.
|
| Edition: | 1st ed. 2019. |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Chapter 1: Introduction to Hunting Bugs
- Chapter 2: Setting up Your Environment
- Chapter 3: How to inject Request Forgery
- Chapter 4: How to exploit through Cross Site Scripting (XSS)
- Chapter 5: Header Injection and URL Redirection
- Chapter 6: Malicious Files
- Chapter 7: Poisoning Sender Policy Framework (SPF)
- Chapter 8: Injecting Unintended XML
- Chapter 9: Finding Command Injection Vulnerabilities
- Chapter 10: Finding HTML and SQL Injection Vulnerabilities
- Appendix: Further Reading.