Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Sinha, Sanjib (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Chapter 1: Introduction to Hunting Bugs
  • Chapter 2: Setting up Your Environment
  • Chapter 3: How to inject Request Forgery
  • Chapter 4: How to exploit through Cross Site Scripting (XSS)
  • Chapter 5: Header Injection and URL Redirection
  • Chapter 6: Malicious Files
  • Chapter 7: Poisoning Sender Policy Framework (SPF)
  • Chapter 8: Injecting Unintended XML
  • Chapter 9: Finding Command Injection Vulnerabilities
  • Chapter 10: Finding HTML and SQL Injection Vulnerabilities
  • Appendix: Further Reading.