預估到手價是按參與促銷活動、以最優(yōu)惠的購買方案計算出的價格(不含優(yōu)惠券部分),僅供參考,未必等同于實際到手價。
-
>
全國計算機等級考試最新真考題庫模擬考場及詳解·二級MSOffice高級應用
-
>
決戰(zhàn)行測5000題(言語理解與表達)
-
>
軟件性能測試.分析與調優(yōu)實踐之路
-
>
第一行代碼Android
-
>
JAVA持續(xù)交付
-
>
EXCEL最強教科書(完全版)(全彩印刷)
-
>
深度學習
Kali Linux Web滲透測試 版權信息
- ISBN:9787564183233
- 條形碼:9787564183233 ; 978-7-5641-8323-3
- 裝幀:一般膠版紙
- 冊數(shù):暫無
- 重量:暫無
- 所屬分類:>>
Kali Linux Web滲透測試 內容簡介
《Kali Linux Web滲透測試 第3版(影印版)》展示了如何設置實驗室,幫助你了解網站攻擊的本質和機制,并且深入解釋了經典的攻擊方法。第3版針對新的Kali Linux改動以及*近的網絡攻擊進行了大量更新。在客戶端攻擊,尤其是模糊測試方面,Kali Linux的表現(xiàn)非常出色。 《Kali Linux Web滲透測試 第3版(影印版)》首先將為你全面的介紹黑客攻擊和滲透測試的概念,你會看到在Kali Linux中使用的與Web應用程序攻擊相關的工具。你將深入了解典型的SQL、命令注入缺陷以及多種利用這些缺陷的手法。Web滲透測試還需要對客戶端攻擊具備一般性的了解,而這可以通過對腳本和輸入驗證缺陷的長時間討論來解決。還有一個非常重要的章節(jié)是關于加密算法實現(xiàn)上的缺陷,在這章里我們討論了網絡棧中與加密層有關的新問題。這類攻擊的嚴重性不容小覷,對其的防范與大多數(shù)互聯(lián)網用戶密切相關,當然其中也少不了滲透測試員! ≡凇禟ali Linux Web滲透測試 第3版(影印版)》的結尾,你會使用一種稱為模糊測試的自動化技術來識別Web應用程序中的缺陷。*終,你將了解Web應用程序漏洞以及借助Kali Linux中的工具利用這些漏洞的方法
Kali Linux Web滲透測試 目錄
Chapter 1: Introduction to Penetration Testing and Web Applications
Proactive security testing
Different testing methodologies
Ethical hacking
Penetration testing
Vulnerability assessment
Security audits
Considerations when performing penetration testing
Rules of Engagement
The type and scope of testing
Client contact details
Client IT team notifications
Sensitive data handling
Status meeting and reports
The limitations of penetration testing
The need for testing web applications
Reasons to guard against attacks on web applications
Kali Linux
A web application overview for penetration testers
HTTP protocol
Knowing an HTTP request and response
The request header
The response header
HTTP methods
The GET method
The POST method
The HEAD method
The TRACE method
The PUT and DELETE methods
The OPTIONS method
Keeping sessions in HTTP
Cookies
Cookie flow between server and client
Persistent and nonpersistent cookies
Cookie parameters
HTML data in HTTP response
The server-side code
Multilayer web application
Three-layer web application design
Web services
Introducing SOAP and REST web services
HTTP methods in web services
XML and JSON
AJAX
Building blocks of AJAX
The AJAX workflow
HTML5
WebSockets
Summary
Chapter 2: Setting Up Your Lab with Kali Linux
Kali Linux
Latest improvements in Kali Linux
Installing Kali Linux
Virtualizing Kali Linux versus installing it on physical hardware
Installing on VirtualBox
Creating the virtual machine
Installing the system
Important tools in Kali Linux
CMS & Framework Identification
WPScan
JoomScan
CMSmap
Web Application Proxies
Burp Proxy
Customizing client interception
Modifying requests on the fly
Burp Proxy with HTTPS websites
Zed Attack Proxy
ProxyStrike
Web Crawlers and Directory Bruteforce
……
Chapter 3: Reconnaissance and Profiling the Web Sewer
Reconnaissance
Chapter 4: Authentication and Session Management Flaws
Authentication schemes in web applications
Chapter 5: Detecting and Exploiting Injection-Based Flaws
Command injection
Chapter 6: Finding and Exploiting Cross-Site Scripting (XSS)
Vulnerabilities
Chapter 7: Cross-Site Request Forgery, Identification, and
Exploitation
Chapter 8: Attacking Flaws in Cryptographic Implementations
Chapter 9: AJAX, HTML5, and Client-Side Attacks
Crawling AJAX applications
Chapter 10: Other Common Security Flaws in Web Applications
Insecure direct object references
Chapter 11 : Using Automated Scanners on Web Applications
Considerations before using an automated scanner
Web application vulnerability scanners in Kali Linux
Index
Kali Linux Web滲透測試 作者簡介
Gilberto Najera-Gutierrez is an experienced penetration tester currently working for one ofthe top security testing service providers in Australia. He obtained leading security andpenetration testing certifications, namely Offensive Security Certified Professional (OSCP),EC-Council Certified Security Administrator (ECSA), and GIAC Exploit Researcher andAdvanced Penetration Tester (GXPN); he also holds a Master's degree in Computer Sciencewith specialization in Artificial Intelligence. Gilberto has been working as a penetration tester since 2013, and he has been a securityenthusiast for almost 20 years. He has successfully conducted penetration tests on networksand applications of some the biggest corporations, government agencies, and financialinstitutions in Mexico and Australia.
- >
人文閱讀與收藏·良友文學叢書:一天的工作
- >
羅曼·羅蘭讀書隨筆-精裝
- >
朝聞道
- >
有舍有得是人生
- >
詩經-先民的歌唱
- >
自卑與超越
- >
中國人在烏蘇里邊疆區(qū):歷史與人類學概述
- >
我與地壇