
Web Hacking
Attacks and Defense
Stuart Mc Clure, Saumil Shah, Shreeraj Shah
Résumé
Whether its petty defacing or full-scale cyber-robbery, hackers are moving to the web along with everyone else. In this highly-anticipated new book, security experts Stuart McClure co-author of Hacking Exposed, Saumil Shah, and Shreeraj Shah uncover the latest web attacks and defenses. Web Hacking features include:
- Complete web application security methodologies with detailed techniques and attacks
- Countermeasures for web attacks
- New tools
- New case studies and eye-opening web attack scenarios
- Solutions from the security authorities you trust
Web Hacking is the ultimate technical good read. With solid technical content, keen analysis, and acclaimed cut-to-the-chase writing style, the authors bring unparalleled insight to both well-known and lesser-known web vulnerabilities. They show how to defend your web servers and web-based payment systems. They explain the complete range of attacks, including buffer overflows, the most wicked of attacks. "How Do They Do It?" real-world case studies describe how different attacks work and why they work.
With 95% of all hacker attacks occurring despite a firewall in place, the firewall has become nothing more than a speed bump on the information superhighway. And with web application traffic making up the bulk of the attacks, the cyber-playground is fraught with vandals and bullies who can't wait to get into your pockets.
Enterprise Resource Planning (ERP) vendors are betting the farm on the web. Nearly all of their development efforts are going into deploying web frontends onto their existing backend enterprise software applications. And today'sconnectivity-hungry vendors want every device imaginable on their Internet. Pagers, cell phones, PDA's, and emergency radios only scratch the surface of this house of cards.
Companies and individuals need to wake up and smell the coffin. The web is where all business transactions are moving, and if customers don't demand them, concepts such as privacy and security will simply pass us by.
Implement the techniques and wisdom in Web Hacking to protect your critical corporate and customer information from malicious hackers. You can't afford not to.
Contents
I. THE E-COMMERCE PLAYGROUND
1 Web languages
2 Web and Database servers
3 Payment systems and Shopping Carts
4 HTTP and HTTPS
5 URL: The web hacker's sword
II URLS UNRAVELED
Case Study: the value of understanding the URL
6 Web: Under(the)Cover
7 Source Exposure
8 Site linkage and analysis
III HOW DO THEY DO IT?
Introduction
9 Cyber Grafitti
10 Eshoplifting
11 Database access
12 Java remote command execution
13 Impersonation
14 Buffer overflows - on-the-fly
IV ADVANCED WEB KUNG FU
15 Automating the attacks
16 Worms
17 Beating the IDS
APPENDIX
A Web ports listing
B HTTP/10 and HTTP/11 Protocol Methods and field definitions
C Remote command execution cheatsheet (ASP/JSP/Perl/PHP)
D Source code disclosure cheatsheet (ASP/JSP/Perl/PHP)
E Links and Resources
F Tools (free/commercial and dictionaries, custom created attack and pilfer scripts)
L'auteur - Stuart Mc Clure
Stuart McClure, President/CTO, Foundstone, Inc., brings
over 12 years of IT and security experience to Foundstone.
Stuart is a successful security author, speaker, and
teacher whose writings have been translated into dozens of
languages around the world.
Stuart is the lead author of the best-selling security book
Hacking Exposed: Network Security Secrets and Solutions,
which has been translated into 19 languages, and has
received critical acclaim around the world. In addition, it
was ranked the #4 computer book sold on Amazon in 2001,
positioning it as the best selling security book ever
sold.
L'auteur - Saumil Shah
Saumil Shah, Director of India Operations, Foundstone, Inc., provides information security consulting services to Foundstone clients, specializing in ethical hacking and security architecture. He holds a designation of Certified Information Systems Security Professional. Saumil has had more than six years experience with system administration, network architecture, integrating heterogenous platforms, and information security, and has perfomed numerous ethical hacking exercises for many important IT companies.
L'auteur - Shreeraj Shah
Shreeraj Shah, Consultant & Software Engineer, Foundstone Inc., provides Web Application security-consulting services to Foundstone clients, specializing in analyzing security architecture for Internet/Intranet applications. He has had over 5 years of experience with application development, system administration and application architecture.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Stuart Mc Clure, Saumil Shah, Shreeraj Shah |
Parution | 06/09/2002 |
Nb. de pages | 520 |
Format | 18,5 x 23,2 |
Couverture | Broché |
Poids | 1045g |
Intérieur | Noir et Blanc |
EAN13 | 9780201761764 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet