Hacking Exposed Web Applications
暫譯: 破解曝光:網路應用程式安全分析
Joel Scambray, Mike Shema
- 出版商: McGraw-Hill Education
- 出版日期: 2002-06-19
- 售價: $1,930
- 貴賓價: 9.5 折 $1,834
- 語言: 英文
- 頁數: 386
- 裝訂: Paperback
- ISBN: 007222438X
- ISBN-13: 9780072224382
-
相關分類:
駭客 Hack
已過版
買這商品的人也買了...
-
$399Hacking Linux Exposed (Paperback)
-
$299Hacking Exposed: Windows 2000 (Paperback)
-
$970Introduction to Algorithms, 2/e
-
$931A First Course in Database Systems, 2/e
-
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$490$387 -
$480$379 -
$720$562 -
$750$638 -
$590$466 -
$1,740$1,653 -
$780$616 -
$720$569 -
$560$476 -
$450$356 -
$1,930$1,834 -
$299$254 -
$480$379 -
$750$593 -
$490$382 -
$480$379 -
$690$587 -
$540$427 -
$650$507 -
$490$417
商品描述
This book goes a long way in making the Web a safer place to do business. -- Mark Curphey, Chair of the Open Web Application Security Project
Unleash the hackers arsenal to secure your Web applications
In todays world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-step, how to defend against the latest Web-based attacks by understanding the hackers devious methods and thought processes. Discover how intruders gather information, acquire targets, identify weak spots, gain control, and cover their tracks. Youll get in-depth coverage of real-world hacks--both simple and sophisticated--and detailed countermeasures to protect against them.
What youll learn:
- The proven Hacking Exposed methodology to locate, exploit, and
patch vulnerable platforms and applications
- How attackers identify potential weaknesses in Web application components
- What devastating vulnerabilities exist within Web server platforms such as
Apache, Microsofts Internet Information Server (IIS), Netscape Enterprise
Server, J2EE, ASP.NET, and more
- How to survey Web applications for potential vulnerabilities --including
checking directory structures, helper files, Java classes and applets, HTML
comments, forms, and query strings
- Attack methods against authentication and session management features such
as cookies, hidden tags, and session identifiers
- Most common input validation attacks--crafted input, command execution
characters, and buffer overflows
- Countermeasures for SQL injection attacks such as robust error handling,
custom stored procedures, and proper database configuration
- XML Web services vulnerabilities and best practices
- Tools and techniques used to hack Web clients--including cross-site
scripting, active content attacks and cookie manipulation
- Valuable checklists and tips on hardening Web applications and clients
based on the authors consulting experiences
Contents
Part I: Reconnaissance
1:
Introduction to Web Applications and Security
2:
Profiling
3: Hacking Web Servers
4: Surveying the Application
Part II: The
Attack
5: Authentication
6:
Authorization
7: Attacking Session State
Management
8: Input Validation
Attacks
9: Attacking Web
Datastores
10: Attacking Web
Services
11: Hacking Web Application
Management
12: Web Client Hacking
13: Case Studies
Part III:
Appendixes
A: Web Site Security
Checklist
B: Web Hacking Tools and Techniques
Cribsheet
C: Using Libwhisker
D:
UrlScan Installation and Configuration
E: About the
Companion Web Site
商品描述(中文翻譯)
這本書在讓網路成為一個更安全的商業場所方面貢獻良多。-- Mark Curphey,開放網路應用程式安全專案主席
釋放駭客的武器庫以保護您的網路應用程式
在當今無所不在的網際網路連接和快速發展的網路技術中,線上安全既關鍵又具挑戰性。隨著資訊和服務的增強可用性以及網路攻擊和入侵事件的上升,安全風險達到歷史新高。《Hacking Exposed Web Applications》逐步向您展示如何通過了解駭客的狡詐方法和思維過程來防禦最新的網路攻擊。了解入侵者如何收集資訊、獲取目標、識別弱點、獲得控制權並掩蓋痕跡。您將深入了解現實世界中的駭客攻擊——無論是簡單還是複雜——以及保護措施的詳細內容。
您將學到的內容:
- 經過驗證的《Hacking Exposed》方法論,用於定位、利用和修補易受攻擊的平台和應用程式
- 攻擊者如何識別網路應用程式組件中的潛在弱點
- 網路伺服器平台(如 Apache、微軟的 Internet Information Server (IIS)、Netscape Enterprise Server、J2EE、ASP.NET 等)中存在的毀滅性漏洞
- 如何檢查網路應用程式的潛在漏洞——包括檢查目錄結構、輔助檔案、Java 類和小應用程式、HTML 註解、表單和查詢字串
- 針對身份驗證和會話管理功能(如 cookies、隱藏標籤和會話識別碼)的攻擊方法
- 最常見的輸入驗證攻擊——精心設計的輸入、命令執行字符和緩衝區溢出
- SQL 注入攻擊的對策,如穩健的錯誤處理、自定義存儲過程和正確的資料庫配置
- XML 網路服務的漏洞和最佳實踐
- 用於駭客網路客戶端的工具和技術——包括跨站腳本攻擊、主動內容攻擊和 cookie 操作
- 根據作者的諮詢經驗提供的加固網路應用程式和客戶端的有價值的檢查清單和提示
目錄
第一部分:偵查
1:網路應用程式與安全性介紹
2:輪廓分析
3:駭客攻擊網路伺服器
4:調查應用程式
第二部分:攻擊
5:身份驗證
6:授權
7:攻擊會話狀態管理
8:輸入驗證攻擊
9:攻擊網路資料存儲
10:攻擊網路服務
11:駭客攻擊網路應用程式管理
12:網路客戶端駭客攻擊
13:案例研究
第三部分:附錄
A:網站安全檢查清單
B:網路駭客工具和技術速查表
C:使用 Libwhisker
D:UrlScan 安裝與配置
E:關於伴隨網站的說明