The Web Application Hacker's Handbook und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr

Neu kaufen

oder
Loggen Sie sich ein, um 1-Click® einzuschalten.
oder
Mit kostenloser Probeteilnahme bei Amazon Prime. Melden Sie sich während des Bestellvorgangs an.
Gebraucht kaufen
Gebraucht - Gut Informationen anzeigen
Preis: EUR 34,79

oder
 
   
Jetzt eintauschen
und EUR 8,93 Gutschein erhalten
Eintausch
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von The Web Application Hacker's Handbook auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws [Englisch] [Taschenbuch]

Dafydd Stuttard , Marcus Pinto
1.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
Statt: EUR 40,02
Jetzt: EUR 39,93 kostenlose Lieferung. Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 2 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Lieferung bis Montag, 1. September: Wählen Sie an der Kasse Morning-Express. Siehe Details.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 26,99  
Taschenbuch EUR 39,93  

Kurzbeschreibung

7. Oktober 2011
The highly successful security book returns with a new edition, completely updated
 
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.
* Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
* Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
* Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
 
Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.

Wird oft zusammen gekauft

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws + The Tangled Web: A Guide to Securing Modern Web Applications + Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Preis für alle drei: EUR 108,08

Die ausgewählten Artikel zusammen kaufen

Kunden, die diesen Artikel gekauft haben, kauften auch


Produktinformation

  • Taschenbuch: 912 Seiten
  • Verlag: John Wiley & Sons; Auflage: 2. Auflage (7. Oktober 2011)
  • Sprache: Englisch
  • ISBN-10: 1118026470
  • ISBN-13: 978-1118026472
  • Größe und/oder Gewicht: 23,4 x 18,8 x 5 cm
  • Durchschnittliche Kundenbewertung: 1.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 11.408 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Buchrückseite

New technologies. New attack techniques. Start hacking.
 
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.
 
This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in.
* Discover how cloud architectures and social networking have added exploitable attack surfaces to applications
* Leverage the latest HTML features to deliver powerful cross-site scripting attacks
* Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks
* Learn how to break encrypted session tokens and other sensitive data found in cloud services
* Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users
* Learn new techniques for automating attacksand dealing with CAPTCHAs and cross-site request forgery tokens
* Steal sensitive data across domains using seemingly harmless application functions and new browser features
 
Find help and resources at http://mdsec.net/wahh
* Source code for some of the scripts in the book
* Links to tools and other resources
* A checklist of tasks involved in most attacks
* Answers to the questions posed in each chapter
* Hundreds of interactive vulnerability labs

Über den Autor und weitere Mitwirkende

DAFYDD STUTTARD is an independent security consultant, author, and software developer specializing in penetration testing of web applications and compiled software. Under the alias PortSwigger, Dafydd created the popular Burp Suite of hacking tools.
 
MARCUS PINTO delivers security consultancy and training on web application attack and defense to leading global organizations in the financial, government, telecom, gaming, and retail sectors.
The authors cofounded MDSec, a consulting company that provides training in attack and defense-based security.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

5 Sterne
0
4 Sterne
0
3 Sterne
0
2 Sterne
0
1.0 von 5 Sternen
1.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
9 von 10 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen Well, well, well... 1. September 2013
Format:Taschenbuch
There are two issues coming along with this book, which actually should be kept in mind before buying:
1. The authors heavily promote BURP suite (developed by one of the authors) to be used as THE tool for web application testing. However, most of the described functionality is online available with BURP suite Pro, which can be bought for a nice 249 bucks with a single user license.
2. The authors "gently" provide only labs, where one is advised to test the various described attacks. However, as in the case with BURP suite, this does not come without additional costs...

Under the bottom line, the book does not contain real insight knowledge (use Google and you will acquire the same knowledge, probably at the most in a more readable and technical manner). What it contains are numerous ads for BURP suite and attempts to get more money from you! Stay away from buying and do what a researcher does, research already available sources of knowledge, i.e., the Internet and its numerous discussion boards!

@Edit: The further you get in the book, the more yackety-yak it contains. The authors try to avoid conciseness by all means. Sometimes the book acts as counting sheep. Don't buy!
@@Edit: Maybe the authors also should try to get a little bit up to date and not use Windows 98 and IE 5.1 when showing a screenshot of a successful attack. This somehow makes them cockamamie...
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.4 von 5 Sternen  32 Rezensionen
46 von 46 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen The Book That Keeps on Giving... 14. Oktober 2011
Von Jason Haddix - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
There's a running joke we have on our assessment team about the Web Application Hackers Handbook. Every time we see a new technology, or have to deal with a one-off situation, we start doing research online only to find it was already referenced in WAHH somewhere. We've all read this book several times too, it's like Dafydd and Marcus sneak into our houses at night and add content...

Joking aside though, there is no other reference for web hacking as thorough or complete as WAHH.

With WAHH2 the authors added a significant amount content and rehashed existing chapters that were already deeply technical. The bonus in WAHH2 is its associated labs. Dafydd and Marcus have been giving a live WAHH training for years and have now moved the stellar CTF like challenges to the cloud. You can buy credits ($7 for 1hr) and move right along as you read the book (MDSec.net). When I say the labs are stellar, I mean it. The labs come almost straight from the class and start trivial and then get crazy. The injection labs were by far my favorite, housing 30-40 different injection types/variants each between XSS/SQLi. The CTF in the class (which i'll mention again is where the MDSec.com labs are based from) gets ridiculous toward the end. Even seasoned web testers fall around questions 14-16. But i digress...

WAHH2 is now the defacto buy for any pentest/QA/Audit team. Its usage will surpass any other book on your bookshelf if you are doing practical testing.

5 stars, i'd give it 10 if I could.
55 von 62 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen 2 stars b/c the author's are using a stupid "make money the online labs" scheme 7. Oktober 2012
Von J. Canada - Veröffentlicht auf Amazon.com
Format:Taschenbuch
Pains me to write a bad review for a book that has SO much great stuff. Really, it's full to the brim of really great info.

But where they went way way wrong: they keep referencing "Try it!" modules that refer to an online site, where the have different tutorials set up on a virtual server. You're allowed to try the hack techniques against the server for a "mere 7 dollars per hour".

But that's actually really really expensive (if you don't have a company paying for you, hell, even if you do). The online labs are sophisticated, but not THAT sophisticated. The author could have EASILY put them online for free, or run them cheaper. It'll take you HOURS to figure out anything on his labs, unless youre a seasoned pentest guy.

it's 7 per hour, and you have to choose 1 hour increments. So I found myself listing things i wanted to try in that hour...which i never got through, because HE DIDN'T INCLUDE ANSWERS, OR A GUIDE! You're supposed to figure it out on the go, which is fine and dandy if youre just browsing a site, but not when youre paying 7 dollars an hour to be on a site.

F that...could have done it better/different.
20 von 20 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An Improvement on the Best 1. Oktober 2011
Von Daniel Miessler - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This book improves on what I already thought was the best book on the subject.

The advantage of this book (and now the new version even more so) is in the way it breaks down the topics. Many books sort of jump around with their various sections, while the WAHH takes the precise line that I think is best when building on one's understanding of this topic.

The updated material is significant, and definitely worth the re-purchase. I bought both the dead-tree and the Kindle version.

100% definitely recommended.
23 von 26 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Web Application Hacker's Handbook 2nd ed. 16. August 2012
Von Stinger51 - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
The first 3 chapters are a very good review of the state of Internet security in general. Then you hit chapter 4 and everything becomes C.I.P.U. (clear if previously understood) in a hurry. What is "Burp" and why do I need it? You have to jump to chapter 20 to find out, where you are told how to set up a proxy server. So now what? Use Burp to figure things out! We're going in a circle here. (And this assumes you've got your proxy even working.)

The book also stresses on-line learning thru their website, for a modest fee. But just what do you get for these lessons. I don't know, because the first one doesn't occur until chapter 5. And by then I was turned off by the book.

To be fair, there's a gold mine of material in this book. But it's not for the beginner. You have to put it together like a jig saw puzzle, but without benefit of any picture of what the finished puzzle should look like.

If you are already beyond basic hacking, are aware of the tools available, and know the HTML standard inside out, then this is probably a good book for you. But it is way too much for the newbie. This book should come with the skill level notice of "For intermediate to advanced users."
11 von 11 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Bottom line: buy it 8. April 2013
Von D. Ellis - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
Reading this book up to around page 600 made me seriously question how anyone could give it less than 5 stars. The amount of knowledge it gave me for a mere $25 is absolutely astounding. I was eagerly waiting to finish it so I could come review it.

Then I finished it, and I understood some of the criticisms. It starts to feel like it's repeating itself after a while, and the product placement for Burp start to become a bit more annoying.

Still, the rest of the book is chock full of great, detailed information. If you're like me and had a basic understanding of how SQL injection worked, but wanted to get a deeper look, this book is perfect. If you chopped off the last 200 pages you would have a book that was STILL worth well over $25. It's hard for me to give it less than 5 stars when my major complaint is that it gives too much information.

Bottom line: if you're a beginner or intermediate to web application security and you're wondering whether you should buy this, just do it. You won't be disappointed.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar