Saturday, 12 October 2013

Hacking Exposed Web 2.0

Hacking Exposed Web 2.0

Hacking Exposed Web 2.0

Web 2.0 Security Secrets and Solutions



Book DescriptionProtect your Web 2.0 architecture against the
latest wave of cybercrime using expert tactics
from Internet security professionals.
Hacking Exposed Web 2.0 shows how hackers
perform reconnaissance,
choose their entry point, and attack Web 2.0
- based services, and reveals detailed
countermeasures and defense techniques.
You'll learn how to avoid injection and
buffer overflow attacks, fix browser and
plug-in flaws, and secure AJAX, Flash,
and XML-driven applications. Real-world case
studies illustrate social networking
site weaknesses, cross-site attack methods,
migration vulnerabilities, and IE
shortcomings.

Book Details
Publisher: McGraw-Hill
By: Rich Cannings,
Himanshu Dwivedi,
Zane Lackey
ISBN: 978-0-0714-9461-8
Year: 2007
Pages: 258
Language: English
File size: 6.9 MB
File format: PDF

eBook
Download: Free

Related Posts:

  • Vulnerabilities for Any Website Using Nikto [kali linux] How to Find Vulnerabilities for AnyWebsite Using Nikto Before attacking any website, it's critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without fir… Read More
  • String Based SQL injection What is String Based SQL injection and how to notice them?To make this simple to understand, String Based SQL injection happens when the site is vulnerable to SQL injection but doesn't show us the results needed to be displa… Read More
  • How to find admin pages Today im gonna show how to find admin panels when you have info to login.There's a few options to find it.1) Adding to URLhttp://www.site.com/adminhttp://www.site.com/administratorhttp://www.site.com/admin.phphttp://www.site… Read More
  • Penetration Testing What is the advantage of Penetration Testing Distribution?All Required application for security test are gathered in a single Operating system. You don't need to search for application, Save your time. Penetration Testing Di… Read More
  • Exploiting OpenSSL-Heartbleed Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit You can now quickly detect the OpenSSL-Heartbleed vulnerability very quickly on a network using the ever popular nmap command, and with the lat… Read More

0 comments:

Post a Comment