Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
|
Buy Now
Web Penetration Testing with Kali Linux - (Paperback, 2nd Revised edition)
Loot Price: R1,417
Discovery Miles 14 170
|
|
Web Penetration Testing with Kali Linux - (Paperback, 2nd Revised edition)
Expected to ship within 10 - 15 working days
|
Build your defense against web attacks with Kali Linux 2.0 About
This Book * Gain a deep understanding of the flaws in web
applications and exploit them in a practical manner * Get hands-on
web application hacking experience with a range of tools in Kali
Linux 2.0 * Develop the practical skills required to master
multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For
If you are already working as a network penetration tester and want
to expand your knowledge of web application hacking, then this book
tailored for you. Those who are interested in learning more about
the Kali Sana tools that are used to test web applications will
find this book a thoroughly useful and interesting guide. What You
Will Learn * Set up your lab with Kali Linux 2.0 * Identify the
difference between hacking a web application and network hacking *
Understand the different techniques used to identify the flavor of
web applications * Expose vulnerabilities present in web servers
and their applications using server-side attacks * Use SQL and
cross-site scripting (XSS) attacks * Check for XSS flaws using the
burp suite proxy * Find out about the mitigation techniques used to
negate the effects of the Injection and Blind SQL attacks In Detail
Kali Linux 2.0 is the new generation of the industry-leading
BackTrack Linux penetration testing and security auditing Linux
distribution. It contains several hundred tools aimed at various
information security tasks such as penetration testing, forensics,
and reverse engineering. At the beginning of the book, you will be
introduced to the concepts of hacking and penetration testing and
will get to know about the tools used in Kali Linux 2.0 that relate
to web application hacking. Then, you will gain a deep
understanding of SQL and command injection flaws and ways to
exploit the flaws. Moving on, you will get to know more about
scripting and input validation flaws, AJAX, and the security issues
related to AJAX. At the end of the book, you will use an automated
technique called fuzzing to be able to identify flaws in a web
application. Finally, you will understand the web application
vulnerabilities and the ways in which they can be exploited using
the tools in Kali Linux 2.0. Style and approach This step-by-step
guide covers each topic with detailed practical examples. Every
concept is explained with the help of illustrations using the tools
available in Kali Linux 2.0.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.