eBook The Basics of Web Hacking, 1st Edition

  • Published By:
  • ISBN-10: 0124166598
  • ISBN-13: 9780124166592
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 160 Pages | eBook
  • Original Copyright 2013 | Published/Released May 2014
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price



The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread Web application vulnerabilities. Web apps are a "path of least resistance" that can be exploited to cause the most damage, with the lowest hurdles to overcome. This book introduces not only theory and practical information related to these vulnerabilities, but also the detailed configuration and use of widely available tools. The Basics of Web Hacking offers a simple and clean explanation of how to use tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, and netcat. Josh Pauli teaches software security at Dakota State University and has presented to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He leads you through a focused, three-part approach to Web security, including hacking the server, the Web app, and the Web user. With his approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and known-vulnerable Web application VMs that are widely available and maintained for this purpose. Once you complete the process you will be prepared to test for the most damaging Web exploits and to conduct more advanced Web hacks.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
1: The Basics of Web Hacking.
2: Web Server Hacking.
3: Web Application Recon and Scanning.
4: Web Application Exploitation with Injection.
5: Web Application Exploitation with Broken Authentication and Path Traversal.
6: Web User Hacking.
7: Fixes.
8: Next Steps.