Bug Bounty Hunting for Web Security
Apress (Verlag)
978-1-4842-5390-8 (ISBN)
You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this,you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications.
What You Will Learn
Implement an offensive approach to bug hunting
Create and manage request forgery on web pages
Poison Sender Policy Framework and exploit it
Defend against cross-site scripting (XSS) attacks
Inject headers and test URL redirection
Work with malicious files and command injection
Resist strongly unintended XML attacks
Who This Book Is For
White-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.
Sanjib Sinha is an author and tech writer. Being a certified .NET Windows and web developer, he has specialized in Python security programming, Linux, and many programming languages that include C#, PHP, Python, Dart, Java, and JavaScript. Sanjib has also won Microsoft's Community Contributor Award in 2011 and he has written Beginning Ethical Hacking with Python, Beginning Ethical Hacking with Kali Linux, and two editions of Beginning Laravel for Apress.
Chapter 1: Introduction to Hunting Bugs.- Chapter 2: Setting up Your Environment.- Chapter 3: How to inject Request Forgery.- Chapter 4: How to exploit through Cross Site Scripting (XSS).- Chapter 5: Header Injection and URL Redirection.- Chapter 6: Malicious Files.- Chapter 7: Poisoning Sender Policy Framework (SPF).- Chapter 8: Injecting Unintended XML.- Chapter 9: Finding Command Injection Vulnerabilities.- Chapter 10: Finding HTML and SQL Injection Vulnerabilities.- Appendix: Further Reading.
Erscheinungsdatum | 29.11.2019 |
---|---|
Zusatzinfo | 140 Illustrations, black and white; XVI, 225 p. 140 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | Bounty • bughunting • Bugs • burpsuite • CSRF • defacement • Linux • SPF • sqlinjection • unintendedXML • XSS |
ISBN-10 | 1-4842-5390-6 / 1484253906 |
ISBN-13 | 978-1-4842-5390-8 / 9781484253908 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich