The Web Application Hacker's Handbook und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
EUR 43,18
  • Alle Preisangaben inkl. MwSt.
Nur noch 6 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
The Web Application Hacke... ist in Ihrem Einkaufwagen hinzugefügt worden
Ihren Artikel jetzt
eintauschen und
EUR 7,20 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Alle 2 Bilder anzeigen

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (Englisch) Taschenbuch – 7. Oktober 2011

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 43,18
EUR 32,37 EUR 45,17
63 neu ab EUR 32,37 4 gebraucht ab EUR 45,17

Wird oft zusammen gekauft

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Preis für alle drei: EUR 68,83

Die ausgewählten Artikel zusammen kaufen

Kunden, die diesen Artikel gekauft haben, kauften auch

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


  • Taschenbuch: 912 Seiten
  • Verlag: John Wiley & Sons; Auflage: 2. Auflage (7. Oktober 2011)
  • Sprache: Englisch
  • ISBN-10: 1118026470
  • ISBN-13: 978-1118026472
  • Größe und/oder Gewicht: 18,8 x 4,9 x 23,6 cm
  • Durchschnittliche Kundenbewertung: 1.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 35.411 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr



New technologies. New attack techniques. Start hacking.
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.
This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in.
* Discover how cloud architectures and social networking have added exploitable attack surfaces to applications
* Leverage the latest HTML features to deliver powerful cross-site scripting attacks
* Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks
* Learn how to break encrypted session tokens and other sensitive data found in cloud services
* Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users
* Learn new techniques for automating attacksand dealing with CAPTCHAs and cross-site request forgery tokens
* Steal sensitive data across domains using seemingly harmless application functions and new browser features
Find help and resources at
* Source code for some of the scripts in the book
* Links to tools and other resources
* A checklist of tasks involved in most attacks
* Answers to the questions posed in each chapter
* Hundreds of interactive vulnerability labs

Über den Autor und weitere Mitwirkende

DAFYDD STUTTARD is an independent security consultant, author, and software developer specializing in penetration testing of web applications and compiled software. Under the alias PortSwigger, Dafydd created the popular Burp Suite of hacking tools.
MARCUS PINTO delivers security consultancy and training on web application attack and defense to leading global organizations in the financial, government, telecom, gaming, and retail sectors.
The authors cofounded MDSec, a consulting company that provides training in attack and defense-based security.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?

In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:


1.0 von 5 Sternen
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

13 von 14 Kunden fanden die folgende Rezension hilfreich Von Lokalmatador am 1. September 2013
Format: Taschenbuch
There are two issues coming along with this book, which actually should be kept in mind before buying:
1. The authors heavily promote BURP suite (developed by one of the authors) to be used as THE tool for web application testing. However, most of the described functionality is online available with BURP suite Pro, which can be bought for a nice 249 bucks with a single user license.
2. The authors "gently" provide only labs, where one is advised to test the various described attacks. However, as in the case with BURP suite, this does not come without additional costs...

Under the bottom line, the book does not contain real insight knowledge (use Google and you will acquire the same knowledge, probably at the most in a more readable and technical manner). What it contains are numerous ads for BURP suite and attempts to get more money from you! Stay away from buying and do what a researcher does, research already available sources of knowledge, i.e., the Internet and its numerous discussion boards!

@Edit: The further you get in the book, the more yackety-yak it contains. The authors try to avoid conciseness by all means. Sometimes the book acts as counting sheep. Don't buy!
@@Edit: Maybe the authors also should try to get a little bit up to date and not use Windows 98 and IE 5.1 when showing a screenshot of a successful attack. This somehow makes them cockamamie...
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen

Die hilfreichsten Kundenrezensionen auf (beta) 36 Rezensionen
48 von 48 Kunden fanden die folgende Rezension hilfreich
The Book That Keeps on Giving... 14. Oktober 2011
Von Jason Haddix - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
There's a running joke we have on our assessment team about the Web Application Hackers Handbook. Every time we see a new technology, or have to deal with a one-off situation, we start doing research online only to find it was already referenced in WAHH somewhere. We've all read this book several times too, it's like Dafydd and Marcus sneak into our houses at night and add content...

Joking aside though, there is no other reference for web hacking as thorough or complete as WAHH.

With WAHH2 the authors added a significant amount content and rehashed existing chapters that were already deeply technical. The bonus in WAHH2 is its associated labs. Dafydd and Marcus have been giving a live WAHH training for years and have now moved the stellar CTF like challenges to the cloud. You can buy credits ($7 for 1hr) and move right along as you read the book ( When I say the labs are stellar, I mean it. The labs come almost straight from the class and start trivial and then get crazy. The injection labs were by far my favorite, housing 30-40 different injection types/variants each between XSS/SQLi. The CTF in the class (which i'll mention again is where the labs are based from) gets ridiculous toward the end. Even seasoned web testers fall around questions 14-16. But i digress...

WAHH2 is now the defacto buy for any pentest/QA/Audit team. Its usage will surpass any other book on your bookshelf if you are doing practical testing.

5 stars, i'd give it 10 if I could.
64 von 71 Kunden fanden die folgende Rezension hilfreich
2 stars b/c the author's are using a stupid "make money the online labs" scheme 7. Oktober 2012
Von J. Canada - Veröffentlicht auf
Format: Taschenbuch
Pains me to write a bad review for a book that has SO much great stuff. Really, it's full to the brim of really great info.

But where they went way way wrong: they keep referencing "Try it!" modules that refer to an online site, where the have different tutorials set up on a virtual server. You're allowed to try the hack techniques against the server for a "mere 7 dollars per hour".

But that's actually really really expensive (if you don't have a company paying for you, hell, even if you do). The online labs are sophisticated, but not THAT sophisticated. The author could have EASILY put them online for free, or run them cheaper. It'll take you HOURS to figure out anything on his labs, unless youre a seasoned pentest guy.

it's 7 per hour, and you have to choose 1 hour increments. So I found myself listing things i wanted to try in that hour...which i never got through, because HE DIDN'T INCLUDE ANSWERS, OR A GUIDE! You're supposed to figure it out on the go, which is fine and dandy if youre just browsing a site, but not when youre paying 7 dollars an hour to be on a site.

F that...could have done it better/different.
20 von 20 Kunden fanden die folgende Rezension hilfreich
An Improvement on the Best 1. Oktober 2011
Von Daniel Miessler - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
This book improves on what I already thought was the best book on the subject.

The advantage of this book (and now the new version even more so) is in the way it breaks down the topics. Many books sort of jump around with their various sections, while the WAHH takes the precise line that I think is best when building on one's understanding of this topic.

The updated material is significant, and definitely worth the re-purchase. I bought both the dead-tree and the Kindle version.

100% definitely recommended.
11 von 11 Kunden fanden die folgende Rezension hilfreich
Bottom line: buy it 8. April 2013
Von D. Ellis - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
Reading this book up to around page 600 made me seriously question how anyone could give it less than 5 stars. The amount of knowledge it gave me for a mere $25 is absolutely astounding. I was eagerly waiting to finish it so I could come review it.

Then I finished it, and I understood some of the criticisms. It starts to feel like it's repeating itself after a while, and the product placement for Burp start to become a bit more annoying.

Still, the rest of the book is chock full of great, detailed information. If you're like me and had a basic understanding of how SQL injection worked, but wanted to get a deeper look, this book is perfect. If you chopped off the last 200 pages you would have a book that was STILL worth well over $25. It's hard for me to give it less than 5 stars when my major complaint is that it gives too much information.

Bottom line: if you're a beginner or intermediate to web application security and you're wondering whether you should buy this, just do it. You won't be disappointed.
18 von 20 Kunden fanden die folgende Rezension hilfreich
Good but you have to pay extra to use it all..... 7. Oktober 2012
Von saiello - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
So as a book I will have to say this is a source of information, however, on the other hand it's very deceptive because in order to get the full benefit of the book you really have to:

1. Buy the professional version of Burp Suite which the author wrote.

It would have been nice if some sort of time trial was included.

2. If you want to access any of the labs they talk about in the book you have to subscribe to their training site which is from what I can tell $7.00 an hour...

There are a great many good and free services out there, and personally I feel the this book (while having good material) was really written to support the authors sales efforts.

I would have much rather seen the use of free websites and examples that didn't cost any more money.

It's ok
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.