• RRP: £42.50
  • You Save: £16.91 (40%)
FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
The Web Application Hacke... has been added to your Basket
+ £5.98 delivery
Used: Very Good | Details
Sold by owlsmart_usa
Condition: Used: Very Good
Comment: Light rubbing wear to cover, spine and page edges. Very minimal writing or notations in margins not affecting the text. Possible clean ex-library copy, with their stickers and or stamp(s).
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Paperback – 7 Oct 2011

4.4 out of 5 stars 25 customer reviews

See all 3 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Paperback
£25.59
£25.10 £10.55
Promotion Message Prime Student members get 10% off 1 promotion

Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
click to open popover


Frequently bought together

  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • +
  • Rtfm: Red Team Field Manual
  • +
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
Total price: £45.50
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.



Product details

  • Paperback: 912 pages
  • Publisher: John Wiley & Sons; 2nd Edition edition (5 Oct. 2011)
  • Language: English
  • ISBN-10: 1118026470
  • ISBN-13: 978-1118026472
  • Product Dimensions: 18.5 x 4.6 x 23.4 cm
  • Average Customer Review: 4.4 out of 5 stars 25 customer reviews
  • Amazon Bestsellers Rank: 26,416 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

  • See Complete Table of Contents

Product description

From the Back Cover

New technologies. New attack techniques. Start hacking.

Web applications are everywhere, and they′re insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.

This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today′s complex and highly functional applications. Roll up your sleeves and dig in.

  • Discover how cloud architectures and social networking have added exploitable attack surfaces to applications

  • Leverage the latest HTML features to deliver powerful cross–site scripting attacks

  • Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks

  • Learn how to break encrypted session tokens and other sensitive data found in cloud services

  • Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users

  • Learn new techniques for automating attacksand dealing with CAPTCHAs and cross–site request forgery tokens

  • Steal sensitive data across domains using seemingly harmless application functions and new browser features

Find help and resources at http://mdsec.net/wahh

  • Source code for some of the scripts in the book

  • Links to tools and other resources

  • A checklist of tasks involved in most attacks

  • Answers to the questions posed in each chapter

  • Hundreds of interactive vulnerability labs

About the Author

DAFYDD STUTTARD is an independent security consultant, author, and software developer specializing in penetration testing of web applications and compiled software. Under the alias PortSwigger, Dafydd created the popular Burp Suite of hacking tools.

MARCUS PINTO delivers security consultancy and training on web application attack and defense to leading global organizations in the financial, government, telecom, gaming, and retail sectors.
The authors cofounded MDSec, a consulting company that provides training in attack and defense–based security.



Customer reviews

Top customer reviews

18 December 2011
Format: Paperback|Verified Purchase
5 people found this helpful
|Comment|Report abuse
26 July 2017
Format: Paperback|Verified Purchase
One person found this helpful
|Comment|Report abuse
26 June 2017
Format: Paperback|Verified Purchase
One person found this helpful
|Comment|Report abuse
12 January 2013
Format: Paperback|Verified Purchase
3 people found this helpful
|Comment|Report abuse
12 May 2016
Format: Paperback|Verified Purchase
2 April 2017
Format: Kindle Edition|Verified Purchase
7 December 2017
Format: Paperback|Verified Purchase
6 February 2017
Format: Paperback|Verified Purchase

Would you like to see more reviews about this item?

Pages with related products. See and discover other items: web development, computer networking

Where's My Stuff?

Delivery and Returns

Need Help?