Text
Web application vulnerabilities: detect, exploit, prevent
Chapter 1: Introduction to web application hacking
Introduction
Web application architecture components
Complex web application software components
Putting it all together
The web application hacking methodology
The history of web application hacking and the evolution of tools
Chapter 2: Information Gathering Techniques
Introduction
The principles of automating searches
Application of data mining
Collecting search terms
Chapter 3: Introduction to server side input validation issues
Introduction
Cross site scripting (XSS)
Chapter 4: Client side exploit frameworks
Introduction
AttackAPI
BeEF
CAL9000
Overview of XSS-Proxy
Chapter 5: Web-based malware
Introduction
Attacks on web
Hacking into web sites
Index hijacking
DNS poisoning (pharming)
Malware and the web: what, where, and how to scan
Parsing and emulating HTML
Browser vulnerabilities
Testing HTTP-scanning solution
Tangled legal web
Chapter 6: Web server and web application testing with BackTrack
Introduction
Approach
Core technology
Open source tools
Case studies: the ttols in action
Chapter 7: Securing web based servaices
Introduction
Web security
Stopping browser exploits
SSL and HTTP/S
Instant messaging
Web-based vulnerabilities
Buffer overflows
Making browsers and email client more security
FTP security
Directory services and LDAP security
No other version available