会员   密码 您忘记密码了吗?
1,575,266 本书已上架      购物流程 | 常见问题 | 联系我们 | 关于我们 | 用户协议

有店 App


当前分类

商品分类

浏览历史

当前位置: 首页 > 简体书 > Kali Linux Web滲透測試:影印版(第3版)
Kali Linux Web滲透測試:影印版(第3版)
上一张
下一张
prev next

Kali Linux Web滲透測試:影印版(第3版)

作者: (澳)吉爾博托·N.古鐵雷斯,(印)瓊A.安薩里
出版社: 東南大學出版社
出版日期: 2019-05-01
商品库存: 点击查询库存
以上库存为海外库存属流动性。
可选择“空运”或“海运”配送,空运费每件商品是RM14。
配送时间:空运约8~12个工作天,海运约30个工作天。
(以上预计配送时间不包括出版社库存不足需调货及尚未出版的新品)
定价:   NT636.00
市场价格: RM114.34
本店售价: RM101.76
促销价: RM100.62
剩余时间: 请稍等, 正在载入中...
购买数量:
collect Add to cart Add booking
详细介绍 商品属性 商品标记
內容簡介

Preface

Chapter 1: Introduction to Penetration Testing and Web Applications
Proactive security testing
Different testing methodologies
Ethical hacking
Penetration testing
Vulnerability assessment
Security audits
Considerations when performing penetration testing
Rules of Engagement
The type and scope of testing
Client contact details
Client IT team notifications
Sensitive data handling
Status meeting and reports
The limitations of penetration testing
The need for testing web applications
Reasons to guard against attacks on web applications
Kali Linux
A web application overview for penetration testers
HTTP protocol
Knowing an HTTP request and response
The request header
The response header
HTTP methods
The GET method
The POST method
The HEAD method
The TRACE method
The PUT and DELETE methods
The OPTIONS method
Keeping sessions in HTTP
Cookies
Cookie flow between server and client
Persistent and nonpersistent cookies
Cookie parameters
HTML data in HTTP response
The server-side code
Multilayer web application
Three-layer web application design
Web services
Introducing SOAP and REST web services
HTTP methods in web services
XML and JSON
AJAX
Building blocks of AJAX
The AJAX workflow
HTML5
WebSockets
Summary

Chapter 2: Setting Up Your Lab with Kali Linux
Kali Linux
Latest improvements in Kali Linux
Installing Kali Linux
Virtualizing Kali Linux versus installing it on physical hardware
Installing on VirtualBox
Creating the virtual machine
Installing the system
Important tools in Kali Linux
CMS & Framework Identification
WPScan
JoomScan
CMSmap
Web Application Proxies
Burp Proxy
Customizing client interception
Modifying requests on the fly
Burp Proxy with HTTPS websites
Zed Attack Proxy
ProxyStrike
Web Crawlers and Directory Bruteforce
……

Chapter 3: Reconnaissance and Profiling the Web Sewer
Reconnaissance
Chapter 4: Authentication and Session Management Flaws
Authentication schemes in web applications
Chapter 5: Detecting and Exploiting Injection-Based Flaws
Command injection
Chapter 6: Finding and Exploiting Cross-Site Scripting (XSS)
Vulnerabilities
Chapter 7: Cross-Site Request Forgery, Identification, and
Exploitation
Chapter 8: Attacking Flaws in Cryptographic Implementations
Chapter 9: AJAX, HTML5, and Client-Side Attacks
Crawling AJAX applications
Chapter 10: Other Common Security Flaws in Web Applications
Insecure direct object references
Chapter 11 : Using Automated Scanners on Web Applications
Considerations before using an automated scanner
Web application vulnerability scanners in Kali Linux

Index


作者介紹


目錄