Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then...

Full description

Bibliographic Details
Main Author: Sinha, Sanjib (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2019.
Edition:1st ed. 2019.
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Chapter 1: Introduction to Hunting Bugs
  • Chapter 2: Setting up Your Environment
  • Chapter 3: How to inject Request Forgery
  • Chapter 4: How to exploit through Cross Site Scripting (XSS)
  • Chapter 5: Header Injection and URL Redirection
  • Chapter 6: Malicious Files
  • Chapter 7: Poisoning Sender Policy Framework (SPF)
  • Chapter 8: Injecting Unintended XML
  • Chapter 9: Finding Command Injection Vulnerabilities
  • Chapter 10: Finding HTML and SQL Injection Vulnerabilities
  • Appendix: Further Reading.