qThe techniques in this book are not an option for testersathey are mandatory and these are the guys to tell you how to apply them!q aHarryRobinson, Google. Rigorously test and improve the security of all your Web software! Itas as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If youare vulnerable, youad better discover these attacks yourself, before the black hats do. Now, thereas a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software. In this book, two renowned experts address every category of Web software exploit: attacks on clients, servers, state, user inputs, and more. Youall master powerful attack tools and techniques as you uncover dozens of crucial, widely exploited flaws in Web architecture and coding. The authors reveal where to look for potential threats and attack vectors, how to rigorously test for each of them, and how to mitigate the problems you find. Coverage includes Am Client vulnerabilities, including attacks on client-side validation Am State-based attacks: hidden fields, CGI parameters, cookie poisoning, URL jumping, and session hijacking Am Attacks on user-supplied inputs: cross-site scripting, SQL injection, and directory traversal Am Language- and technology-based attacks: buffer overflows, canonicalization, and NULL string attacks Am Server attacks: SQL Injection with stored procedures, command injection, and server fingerprinting Am Cryptography, privacy, and attacks on Web services Your Web software is mission-criticalait canat be compromised. Whether youare a developer, tester, QA specialist, or IT manager, this book will help you protect that softwareasystematically.aquot;The techniques in this book are not an option for testersathey are mandatory and these are the guys to tell you how to apply them!aquot; aHarryRobinson, Google.
|Title||:||How to Break Web Software|
|Author||:||Mike Andrews, James A. Whittaker|
|Publisher||:||Addison-Wesley Professional - 2006-02-02|