<Embed>
£23.20
  • RRP: £37.99
  • You Save: £14.79 (39%)
In stock.
Available as a Kindle eBook. Kindle eBooks can be read on any device with the free Kindle app.
Dispatched from and sold by Amazon.
The Web Application Hacke... has been added to your Basket
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Follow the author

Something went wrong. Please try your request again later.


The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Paperback – Illustrated, 5 Oct. 2011

4.5 out of 5 stars 434 ratings

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Paperback, Illustrated
£23.20
£23.20 £24.05
FREE delivery: Monday, Oct 26 Details
FREE Delivery on book orders dispatched by Amazon over £10.00 .
Fastest delivery: Tomorrow
Order within 3 hrs 56 mins
Details
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
click to open popover

Special offers and product promotions

  • Amazon Business : For business-exclusive pricing, quantity discounts and downloadable VAT invoices. Create a free account
  • Buy this product and stream 90 days of Amazon Music Unlimited for free. E-mail after purchase. Conditions apply. Learn more

Frequently bought together

  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • +
  • Rtfm: Red Team Field Manual
  • +
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
Total price: £49.63
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone

To get the free app, enter your mobile phone number.

kcpAppSendButton


Product details

  • Paperback : 912 pages
  • ISBN-10 : 1118026470
  • ISBN-13 : 978-1118026472
  • Product Dimensions : 18.8 x 4.83 x 22.86 cm
  • Publisher : Wiley (5 Oct. 2011)
  • Language: : English
  • Customer reviews:
    4.5 out of 5 stars 434 ratings

Product description

From the Inside Flap

New technologies. New attack techniques. Start hacking.

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.

This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in.

  • Discover how cloud architectures and social networking have added exploitable attack surfaces to applications

  • Leverage the latest HTML features to deliver powerful cross-site scripting attacks

  • Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks

  • Learn how to break encrypted session tokens and other sensitive data found in cloud services

  • Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users

  • Learn new techniques for automating attacksand dealing with CAPTCHAs and cross-site request forgery tokens

  • Steal sensitive data across domains using seemingly harmless application functions and new browser features

Find help and resources at http://mdsec.net/wahh

  • Source code for some of the scripts in the book

  • Links to tools and other resources

  • A checklist of tasks involved in most attacks

  • Answers to the questions posed in each chapter

  • Hundreds of interactive vulnerability labs

From the Back Cover

New technologies. New attack techniques. Start hacking.

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.

This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in.

  • Discover how cloud architectures and social networking have added exploitable attack surfaces to applications

  • Leverage the latest HTML features to deliver powerful cross-site scripting attacks

  • Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks

  • Learn how to break encrypted session tokens and other sensitive data found in cloud services

  • Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users

  • Learn new techniques for automating attacksand dealing with CAPTCHAs and cross-site request forgery tokens

  • Steal sensitive data across domains using seemingly harmless application functions and new browser features

Find help and resources at http: //mdsec.net/wahh

  • Source code for some of the scripts in the book

  • Links to tools and other resources

  • A checklist of tasks involved in most attacks

  • Answers to the questions posed in each chapter

  • Hundreds of interactive vulnerability labs

Customer reviews

4.5 out of 5 stars
4.5 out of 5
434 global ratings
How are ratings calculated?

Top reviews from United Kingdom

Reviewed in the United Kingdom on 15 January 2019
Verified Purchase
3 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 26 July 2017
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 18 December 2011
Verified Purchase
6 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 3 February 2019
Verified Purchase
Reviewed in the United Kingdom on 31 May 2018
Verified Purchase
5 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 12 January 2013
Verified Purchase
3 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 26 June 2017
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United Kingdom on 24 November 2019
Verified Purchase
Pages with related products. See and discover other items: computer networking