Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Attack and Defend Your Website
How to Attack and Defend Your Website
How to Attack and Defend Your Website
Ebook125 pages36 minutes

How to Attack and Defend Your Website

Rating: 0 out of 5 stars

()

Read preview

About this ebook

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities.

This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols.

How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

  • Learn the basics of penetration testing so that you can test your own website's integrity and security
  • Discover useful tools such as Burp Suite, DVWA, and SQLMap
  • Gain a deeper understanding of how your website works and how best to protect it
LanguageEnglish
Release dateDec 5, 2014
ISBN9780128027547
How to Attack and Defend Your Website
Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Read more from Henry Dalziel

Related to How to Attack and Defend Your Website

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for How to Attack and Defend Your Website

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    How to Attack and Defend Your Website - Henry Dalziel

    How to Attack and Defend Your Website

    Henry Dalziel

    Table of Contents

    Cover

    Title page

    Copyright

    Author Biography

    Contributing Editor Biography

    Introduction

    Chapter 1: Web Technologies

    Abstract

    1.1. Web servers

    1.2. Client-side versus server-side programming languages

    1.3. JavaScript – what is it?

    1.4. What can JavaScript do?

    1.5. What can JavaScript not do?

    1.6. Databases

    1.7. What about HTML?

    1.8. Web technologies – putting it together

    1.9. Digging deeper

    1.10. Hypertext Transfer Protocol (HTTP)

    1.11. Verbs

    1.12. Special characters and encodings

    1.13. Cookies, sessions, and authentication

    1.14. Short exercise: Linux machine setup

    1.15. Using the Burp Suite intercepting proxy

    1.16. Why is the intercepting proxy important?

    1.17. Short exercise – using the Burp Suite decoder

    1.18. Short exercise – getting comfortable with HTTP and Burp Suite

    1.19. Understanding the application

    1.20. The Burp Suite site map

    1.21. Discovering content and structures

    1.22. Understanding an application

    Chapter 2: Exploitation

    Abstract

    2.1. Bypassing client side controls

    2.2. Bypassing client-side controls – example

    2.3. Bypassing client-side controls – exercise solution

    2.4. SQL injection

    2.5. SQL injection

    2.6. Short Exercise: Pwning with SQLMap

    2.7. Cross-site scripting (XSS)

    2.8. Stored cross-site scripting XSS

    2.9. Short exercise: using stored XSS to deface a website

    Chapter 3: Finding Vulnerabilities

    Abstract

    3.1. The basic process – steps

    3.2. Exercise – finding vulnerabilities

    Copyright

    Syngress is an imprint of Elsevier

    225 Wyman Street, Waltham, MA 02451, USA

    Copyright © 2015 Elsevier Inc. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

    This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

    Notices

    Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

    To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

    British Library Cataloguing-in-Publication Data

    A catalogue record for this book is available from the British Library

    Library of Congress Cataloging-in-Publication Data

    A catalog record for this book is available from the Library of Congress

    ISBN: 978-0-12-802732-5

    For information on all Syngress publications visit our website at http://store.elsevier.com/

    Author Biography

    Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content (books and courses) for cybersecurity professionals seeking skill enhancement and career

    Enjoying the preview?
    Page 1 of 1