|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
A quick, easy-to-read synthesis of theory, guidelines, and
evidence-based research, this book offers timely, practical
guidance for library and information professionals who must
navigate ethical crises in information privacy and stay on top of
emerging privacy trends. Emerging technologies create new concerns
about information privacy within library and information
organizations, and many information professionals lack guidance on
how to navigate the ethical crises that emerge when information
privacy and library policy clash. What should we do when a patron
leaves something behind? How do we justify filtering internet
access while respecting accessibility and privacy? How do we
balance new technologies that provide anonymity with the library's
need to prevent the illegal use of their facilities? Library
Patrons' Privacy presents clear, conversational, evidence-based
guidance on how to navigate these ethical questions in information
privacy. Ideas from professional organizations, government
entities, scholarly publications, and personal experiences are
synthesized into an approachable guide for librarians at all stages
of their career. This guide, designed by three experienced LIS
scholars and professionals, is a quick and enjoyable read that
students and professionals of all levels of technical knowledge and
skill will find useful and applicable to their libraries. Presents
practical, evidence-based guidance for navigating common ethical
problems in library and information science Introduces library and
information professionals and students to emerging issues in
information privacy Provides students and practitioners with a
foundation of practical problem-solving strategies for handling
information privacy issues in emerging technologies Guides the
design of new information privacy policy in all types of libraries
Encourages engagement with information privacy technologies to
assist in fulfilling the American Library Association's core values
|
|