Web Hacking: Attacks and Defense (Paperback)
暫譯: 網路駭客:攻擊與防禦 (平裝本)
Stuart McClure, Saumil Shah, Shreeraj Shah
- 出版商: Addison Wesley
- 出版日期: 2002-08-18
- 售價: $1,580
- 貴賓價: 9.5 折 $1,501
- 語言: 英文
- 頁數: 528
- 裝訂: Paperback
- ISBN: 0201761769
- ISBN-13: 9780201761764
-
相關分類:
駭客 Hack
立即出貨 (庫存 < 4)
買這商品的人也買了...
-
$792Windows Internet Security
-
$2,210$2,100 -
$1,270$1,207 -
$480$379 -
$700$665 -
$580$458 -
$680$537 -
$450$383 -
$480$379 -
$580$522 -
$650$514 -
$1,560$1,326 -
$620$490 -
$880$695 -
$620$490 -
$560$476 -
$620$490 -
$450$356 -
$850$723 -
$490$382 -
$590$502 -
$420$332 -
$680$537 -
$680$537 -
$420$332
商品描述
Description
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..."
--From the Foreword by William C. Boni, Chief Information Security Officer, Motorola"Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why."
--Lance Spitzner, Founder, The Honeynet ProjectWhether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense.
Features include:
- Overview of the Web and what hackers go after
- Complete Web application security methodologies
- Detailed analysis of hack techniques
- Countermeasures
- What to do at development time to eliminate vulnerabilities
- New case studies and eye-opening attack scenarios
- Advanced Web hacking concepts, methodologies, and tools
"How Do They Do It?" sections show how and why different attacks succeed, including:
- Cyber graffiti and Web site defacements
- e-Shoplifting
- Database access and Web applications
- Java™ application servers; how to harden your Java™ Web Server
- Impersonation and session hijacking
- Buffer overflows, the most wicked of attacks
- Automated attack tools and worms
Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques.
Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks.
Table of Contents
(NOTE: Each chapter begins with an Introduction and concludes with a Summary.)
Foreword.
Introduction.
“We're Secure, We Have a Firewall”.
To Err Is Human.
Writing on the Wall.
Book Organization.
Parts.
Chapters.
A Final Word.
Acknowledgments.
Contributor.I. THE E-COMMERCE PLAYGROUND.
Case Study: Acme Art, Inc. Hacked!
1. Web Languages: The Babylon of the 21st Century.
Languages of the Web.
HTML.
Dynamic HTML (DHTML).
XML.
XHTML.
Perl.
PHP.
ColdFusion.
Active Server Pages.
CGI.
Java.2. Web and Database Servers.
Web Servers.
Apache.
Microsoft's Internet Information Server (IIS).
Database Servers.
Microsoft SQL Server.
Oracle.3. Shopping Carts and Payment Gateways.
Evolution of the Storefront.
Electronic Shopping.
Shopping Cart Systems.
Scope and Lifetime of an Electronic Shopping Cart.
Collecting, Analyzing, and Comparing Selected Components.
Keeping Track of the Total Cost.
Change of Mind.
Processing the Purchase.
Implementation of a Shopping Cart Application.
Product Catalog.
Session Management.
Database Interfacing.
Integration with the Payment Gateway.
Examples of Poorly Implemented Shopping Carts.
Carello Shopping Cart.
DCShop Shopping Cart.
Hassan Consulting's Shopping Cart.
Cart32 and Several Other Shopping Carts.
Processing Payments.
Finalizing the Order.
Method of Payment.
Verification and Fraud Protection.
Order Fulfillment and Receipt Generation.
Overview of the Payment Processing System.
Innovative Ways to Combat Credit Card Fraud.
Order Confirmation Page.
Payment Gateway Interface.
Transaction Database Interface.
Interfacing with a Payment Gateway—An Example.
Payment System Implementation Issues.
Integration.
Temporary Information.
SSL.
Storing User Profiles.
Vulnerabilities Caused by Poor Integration of Shopping Cart and Payment Gateway.
PayPal—Enabling Individuals to Accept Electronic Payments.4. HTTP and HTTPS: The Hacking Protocols.
Protocols of the Web.
HTTP.
HTTPS (HTTP over SSL).5. URL: The Web Hacker's Sword.
URL Structure.
Web Hacker Psychology.
URLs and Parameter Passing.
URL Encoding.
Meta-Characters.
Specifying Special Characters on the URL String.
Meta-Characters and Input Validation.
Unicode Encoding.
The Acme Art, Inc. Hack.
Abusing URL Encoding.
Unicode Encoding and Code Red's Shell Code.
Unicode Vulnerability.
The Double-Decode or Superfluous Decode Vulnerability.
HTML Forms.
Anatomy of an HTML Form.
Input Elements.
Parameter Passing Via GET and POST.II. URLS UNRAVELED.
Case Study: Reconnaissance Leaks Corporate Assets.
6. Web: Under (the) Cover.
The Components of a Web Application.
The Front-End Web Server.
The Web Application Execution Environment.
The Database Server.
Wiring the Components.
The Native Application Processing Environment.
Web Server APIs and Plug-Ins.
URL Mapping and Internal Proxying.
Proxying with a Back-End Application Server.
Examples.
Connecting with the Database.
The Craftiest Hack of Them All.
Using Native Database APIs.
Examples.
Using ODBC.
Using JDBC.
Specialized Web Application Servers.
Identifying Web Application Components from URLs.
The Basics of Technology Identification.
Examples.
More Examples.
Advanced Techniques for Technology Identification.
Examples.
Identifying Database Servers.
Countermeasures.
Rule 1: Minimize Information Leaked from the HTTP Header.
Rule 2: Prevent Error Information from Being Sent to the Browser.7. Reading Between the Lines.
Information Leakage Through HTML.
What the Browsers Don't Show You .
Netscape Navigator—View | Page Source.
Internet Explorer—View | Source.
Clues to Look For.
HTML Comments.
Revision History.
Developer or Author Details.
Cross-References to Other Areas of the Web Application.
Reminders and Placeholders.
Comments Inserted by Web Application Servers.
Old “Commented-Out” Code.
Internal and External Hyperlinks.
E-mail Addresses and Usernames.
UBE, UCE, Junk Mail, and Spam.
Keywords and Meta Tags.
Hidden Fields.
Client-Side Scripts.
Automated Source Sifting Techniques.
Using wget.
Using grep.
Sam Spade, Black Widow, and Teleport Pro.8. Site Linkage Analysis.
HTML and Site Linkage Analysis.
Site Linkage Analysis Methodology.
Step 1: Crawling the Web Site .
Crawling a Site Manually.
A Closer Look at the HTTP Response Header.
Some Popular Tools for Site Linkage Analysis.
Step-1 Wrap-Up.
Crawlers and Redirection.
Step 2: Creating Logical Groups Within the Application Structure.
Step-2 Wrap-Up.
Step 3: Analyzing Each Web Resource.
1. Extension Analysis.
2. URL Path Analysis.
3. Session Analysis.
4. Form Determination.
5. Applet and Object Identification.
6. Client-Side Script Evaluation.
7. Comment and E-Mail Address Analysis.
Step-3 Wrap-Up.
Step 4: Inventorying Web Resources.III. HOW DO THEY DO IT?
Case Study: How Boris Met Anna's Need for Art Supplies.
9. Cyber Graffiti.
Defacing Acme Travel, Inc.'s Web Site.
Mapping the Target Network.
Throwing Proxy Servers in Reverse.
Brute Forcing HTTP Authentication.
Directory Browsing.
Uploading the Defaced Pages.
What Went Wrong?
HTTP Brute-Forcing Tools.
Brutus.
WebCracker 4.0.
Countermeasures Against the Acme Travel, Inc. Hack.
Turning Off Reverse Proxying.
Using Stronger HTTP Authentication Passwords.
Turning off Directory Browsing.10. E-Shoplifting.
Building an Electronic Store.
The Store Front-End.
The Shopping Cart.
The Checkout Station.
The Database.
Putting It All Together.
Evolution of Electronic Storefronts.
Robbing Acme Fashions, Inc.
Setting Up Acme's Electronic Storefront.
Tracking Down the Problem.
Bypassing Client-Side Validation.
Using Search Engines to Look for Hidden Fields.
Overhauling www.acme-fashions.com.
Facing a New Problem with the Overhauled System.
Postmortem and Further Countermeasures.
Shopping Carts with Remote Command Execution.11. Database Access.
Direct SQL Attacks.
A Used Car Dealership Is Hacked.
Input Validation.
Countermeasures.12. Java: Remote Command Execution.
Java-Driven Technology.
Architecture of Java Application Servers.
Attacking a Java Web Server.
Identifying Loopholes in Java Application Servers.
Example: Online Stock Trading Portal.
Invoking FileServlet.
Countermeasures.
Harden the Java Web Server.
Other Conceptual Countermeasures.13. Impersonation.
Session Hijacking: A Stolen Identity and a Broken Date.
March 5, 7:00 A.M.—Alice's Residence.
8:30 A.M.—Alice's Workplace.
10:00 A.M.—Bob's Office.
11:00 A.M.—Bob's Office.
12:30 P.M.—Alice's Office.
9:30 P.M.-Bertolini's Italian Cuisine.
Session Hijacking.
Postmortem of the Session Hijacking Attack.
Application State Diagrams.
HTTP and Session Tracking.
Stateless Versus Stateful Applications.
Cookies and Hidden Fields.
Cookie Control, Using Netscape on a Unix Platform.
Cookies.
Hidden Fields.
Implementing Session and State Tracking.
Session Identifiers Should Be Unique.
Session Identifiers Should Not Be “Guessable”.
Session Identifiers Should Be Independent.
Session Identifiers Should Be Mapped with Client-Side Connections.14. Buffer Overflows: On-the-Fly.
Example.
Buffer Overflows.
Buffer Overflow: Its Simplest Form.
Buffer Overflow: An Example.
Postmortem Countermeasures.IV. ADVANCED WEB KUNG FU.
Case Study.
15. Web Hacking: Automated Tools.
Netcat.
Whisker.
Brute Force.
Brutus.
Achilles.
Cookie Pal.
Teleport Pro.
Security Recommendations.16. Worms.
Code Red Worm.
January 26, 2000.
June 18, 2001: The First Attack.
July 12, 2001.
July 19, 2001.
August 4, 2001.
Nimda Worm.
Combatting Worm Evolution.
React and Respond.17. Beating the IDS.
IDS Basics.
Network IDSs.
Host-Based IDSs.
IDS Accuracy.
Getting Past an IDS.
Secure Hacking-Hacking Over SSL.
Example.
Tunneling Attacks via SSL.
Intrusion Detection via SSL.
Sniffing SSL Traffic.
Polymorphic URLs.
Hexadecimal Encoding.
Illegal Unicode/Superfluous Encoding.
Adding Fake Paths.
Inserting Slash-Dot-Slash Strings.
Using Nonstandard Path Separators.
Using Multiple Slashes.
Mixing Various Techniques.
Generating False Positives.
IDS Evasion in Vulnerability Checkers.
Potential Countermeasures.
SSL Decryption.
URL Decoding.Appendix A: Web and Database Port Listing.Appendix B: HTTP/1.1 and HTTP/1.0 Method and Field Definitions.Appendix C: Remote Command Execution Cheat Sheet.Appendix D: Source Code, File, and Directory Disclosure Cheat Sheet.Appendix E: Resources and Links.Appendix F: Web-Related Tools.Index. 0201761769T07312002
商品描述(中文翻譯)
**描述**
「無論是新手還是資深讀者,都將對網路駭客的運作有更深入的了解,並提升抵禦這類網路攻擊的技能。本書涵蓋的技術包括網路語言和協議、網路和資料庫伺服器、支付系統和購物車,以及與 URL 相關的關鍵漏洞。本書是一個虛擬的戰鬥計畫,將幫助您識別和消除可能使您的網站下線的威脅……」
--摘自摩托羅拉首席資訊安全官 William C. Boni 的前言
「僅僅擁有防火牆和 IDS 感測器並不意味著您是安全的;本書將告訴您為什麼。」
--Lance Spitzner,Honeynet Project 創始人
無論是小規模的網站破壞還是全面的網路搶劫,駭客正隨著其他人一起轉向網路。使用基於網路的商業應用程式的組織面臨的風險日益增加。《Web Hacking: Attacks and Defense》是一本強大的指南,提供有關網路攻擊和防禦的最新資訊。安全專家 Stuart McClure(《Hacking Exposed》的主編)、Saumil Shah 和 Shreeraj Shah 提供了廣泛的網路攻擊和防禦知識。
特色包括:
- 網路概述及駭客的攻擊目標
- 完整的網路應用程式安全方法論
- 駭客技術的詳細分析
- 對策
- 在開發階段消除漏洞的措施
- 新的案例研究和引人注目的攻擊情境
- 進階的網路駭客概念、方法論和工具
「他們是如何做到的?」部分展示了不同攻擊成功的方式和原因,包括:
- 網路塗鴉和網站破壞
- 電子商店盜竊
- 資料庫訪問和網路應用程式
- Java™ 應用伺服器;如何加固您的 Java™ 網路伺服器
- 冒充和會話劫持
- 緩衝區溢出,最惡劣的攻擊
- 自動化攻擊工具和蠕蟲
附錄包括網路和資料庫端口的列表、遠端命令執行的備忘單,以及源代碼披露技術。
《Web Hacking》從實戰中提供資訊。專家將告訴您如何連接各個環節——如何將網路駭客的各個階段串聯起來,以便您能夠最佳地防禦它們。本書以無與倫比的技術內容和經過實戰考驗的分析,旨在最大化讀者的理解,幫助您對抗潛在的高成本安全威脅和攻擊。
**目錄**
(注意:每章以引言開始,並以總結結束。)
**前言**
**引言**
- 「我們是安全的,我們有防火牆。」
- 錯誤是人之常情。
- 墙上的字。
- 書籍組織。
- 部分。
- 章節。
- 最後的話。
- 感謝。
- 貢獻者。
**I. 電子商務遊樂場**
- 案例研究:Acme Art, Inc. 被駭!
1. 網路語言:21世紀的巴比倫。
- 網路的語言。
- HTML。
- 動態 HTML (DHTML)。
- XML。
- XHTML。
- Perl。
- PHP。
- ColdFusion。
- Active Server Pages。
- CGI。
- Java。
2. 網路和資料庫伺服器。
- 網路伺服器。
- Apache。
- 微軟的 Internet Information Server (IIS)。
- 資料庫伺服器。
- 微軟 SQL Server。
- Oracle。
3. 購物車和支付網關。
- 商店前端的演變。
- 電子購物。
- 購物車系統。
- 電子購物車的範圍和壽命。
- 收集、分析和比較選定的組件。
- 追蹤總成本。
- 改變主意。
- 處理購買。
- 購物車應用程式的實施。
- 產品目錄。
- 會話管理。
- 資料庫介接。
- 與支付網關的整合。
- 實施不良的購物車範例。