- Buy this product and stream 90 days of Amazon Music Unlimited for free. E-mail after purchase. Conditions apply. Learn more
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Paperback – 5 Oct. 2011
|New from||Used from|
Frequently bought together
Customers who viewed this item also viewed
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Would you like to tell us about a lower price?
If you are a seller for this product, would you like to suggest updates through seller support?
From the Back Cover
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.
This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in.
Discover how cloud architectures and social networking have added exploitable attack surfaces to applications
Leverage the latest HTML features to deliver powerful cross-site scripting attacks
Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks
Learn how to break encrypted session tokens and other sensitive data found in cloud services
Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users
Learn new techniques for automating attacksand dealing with CAPTCHAs and cross-site request forgery tokens
Steal sensitive data across domains using seemingly harmless application functions and new browser features
Find help and resources at http: //mdsec.net/wahh
Source code for some of the scripts in the book
Links to tools and other resources
A checklist of tasks involved in most attacks
Answers to the questions posed in each chapter
Hundreds of interactive vulnerability labs
About the Author
Customers who bought this item also bought
There was a problem filtering reviews right now. Please try again later.
I think as time goes on, the book will become even more useful for me. For the price and the staggering amount of detail and information, it's a no-brainer. This is basically a fantastic reference book and knowledge-base for anyone who is serious about digital security.
Highly recommended and is used on a daily basis. If you work as a web developer or in cyber security then this book is a must.
While reading the book i found it was quite dry because i was not doing the practical excersises available online. As you have to pay for them i wasn't sure if it would be worth it. With hindsight after doing the course i would highly recommend using them. It will make the content a lot more interesting but also teach a key skill which the book doesn't:
The key to most pen testing and vulnerability research is persistence and logical thinking. It is very well to think you know how a certain bug works but it can still be quite a challenge to actually implement it.
I feel very lucky to have been able to attend the live course for hands on help from the authors but you can definitely get all the information and practice you need purely from the book and the website. Its a shame that there isn't a couple of hours of practical time included when you buy the book.
It is very well written and covers all the areas you would expect. A lot of the old school web bugs explained such as SQL injection and less common now because of better programming practices and interfaces. Later chapters in the book such as the methodologies and logic flaw errors are timeless.
The book also provides real world solutions and mitigation's for the attacks described so this is highly recommended for anyone who develops web applications swell as people who carry out penetration testing on them.
While this may not be the best book ever written i think it definitively describes the topic therefore i have given it 5 stars.
Top international reviews
Not true. I am at chp 3 where the actual testing begins and I am bamboozled. I had hoped that the vulnerable app they use in book would be available online but sadly no. Hence I am finding it impossible to follow the authors train of thought and I find myself having no opportunity to practice the methods in book. Later it just becomes worse as things start to complicate.
I strongly recommend not to buy this book if you are new to the scene and wish to start a career in web app testing. Start with a much easier book. I am in process of finding the same.
I bought it and read up first few chapters and I am disappointed.
When I want to try by examples which list under 'Try it'. They are no longer available as the company doesn't support the lab any more. So, ...as a new person to lean this subject without online examples, the content of this book is not quite easy to understand!
Probably the best book on the market in its area!
The companion web site is a great thing. It allows you to easily test the techniques explained in a controlled way.
Must read for every Web Application Security Professional or every serious and professional. I almost wish it was a mandatory reading in order to get a job as a web application developer.
La entrega también a tiempo, pero me ha llegado rajado. Al no ser un libro barato, por lo menos me esperaba que llegara en óptimas condiciones.