Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2019.
|
Έκδοση: | 1st ed. 2019. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chapter 1: Introduction to Hunting Bugs
- Chapter 2: Setting up Your Environment
- Chapter 3: How to inject Request Forgery
- Chapter 4: How to exploit through Cross Site Scripting (XSS)
- Chapter 5: Header Injection and URL Redirection
- Chapter 6: Malicious Files
- Chapter 7: Poisoning Sender Policy Framework (SPF)
- Chapter 8: Injecting Unintended XML
- Chapter 9: Finding Command Injection Vulnerabilities
- Chapter 10: Finding HTML and SQL Injection Vulnerabilities
- Appendix: Further Reading.