Hacking Exposed Web 2.0
Web 2.0 Security Secrets and Solutions
Book DescriptionProtect your Web 2.0 architecture against the
latest wave of cybercrime using expert tactics
from Internet security professionals.
Hacking Exposed Web 2.0 shows how hackers
perform reconnaissance,
choose their entry point, and attack Web 2.0
- based services, and reveals detailed
countermeasures and defense techniques.
You'll learn how to avoid injection and
buffer overflow attacks, fix browser and
plug-in flaws, and secure AJAX, Flash,
and XML-driven applications. Real-world case
studies illustrate social networking
site weaknesses, cross-site attack methods,
migration vulnerabilities, and IE
shortcomings.
Book Details
Publisher: McGraw-Hill
By: Rich Cannings,
Himanshu Dwivedi,
Zane Lackey
ISBN: 978-0-0714-9461-8
Year: 2007
Pages: 258
Language: English
File size: 6.9 MB
File format: PDF
eBook
Download: Free
Related Posts:
Vulnerabilities for Any Website Using Nikto [kali linux]
How to Find Vulnerabilities for AnyWebsite Using Nikto
Before attacking any website, it's critical to do good reconnaissance.
A few minutes of recon can save you hours on a hack. Simply trying
various attacks without fir… Read More
String Based SQL injection
What is String Based SQL injection and how to notice them?To make this simple to understand, String Based SQL injection happens when the site is vulnerable to SQL injection but doesn't show us the results needed to be displa… Read More
How to find admin pages
Today im gonna show how to find admin panels when you have info to login.There's a few options to find it.1) Adding to URLhttp://www.site.com/adminhttp://www.site.com/administratorhttp://www.site.com/admin.phphttp://www.site… Read More
Penetration Testing
What is the advantage of Penetration Testing Distribution?All Required application for security test are gathered in a single Operating system. You don't need to search for application, Save your time. Penetration Testing Di… Read More
Exploiting OpenSSL-Heartbleed
Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit
You can now quickly detect the
OpenSSL-Heartbleed vulnerability very quickly on a network using the
ever popular nmap command, and with the lat… Read More
0 comments:
Post a Comment