Attacking and Exploiting Modern Web Applications : Discover the mindset, techniques, and tools to perform modern web attacks and exploitation

個数:

Attacking and Exploiting Modern Web Applications : Discover the mindset, techniques, and tools to perform modern web attacks and exploitation

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • ≪洋書のご注文について≫ 「海外取次在庫あり」「国内在庫僅少」および「国内仕入れ先からお取り寄せいたします」表示の商品でもクリスマス前(12/20~12/25)および年末年始までにお届けできないことがございます。あらかじめご了承ください。

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 338 p.
  • 言語 ENG
  • 商品コード 9781801816298
  • DDC分類 005.8

Full Description

Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contracts
Purchase of the print or Kindle book includes a free PDF eBook

Key Features

Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries
Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy
Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO level

Book DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks.
The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You'll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you'll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You'll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you'll find out how to disclose vulnerabilities.
By the end of this book, you'll have enhanced your ability to find and exploit web vulnerabilities.What you will learn

Understand the mindset, methodologies, and toolset needed to carry out web attacks
Discover how SAML and SSO work and study their vulnerabilities
Get to grips with WordPress and learn how to exploit SQL injection
Find out how IoT devices work and exploit command injection
Familiarize yourself with ElectronJS applications and transform an XSS to an RCE
Discover how to audit Solidity's Ethereum smart contracts
Get the hang of decompiling, debugging, and instrumenting web applications

Who this book is forThis book is for anyone whose job role involves ensuring their organization's security - penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. Basic knowledge of web technologies, as well as related protocols is a must.

Contents

Table of Contents

Mindset and Methodologies
Toolset for Web Attacks and Exploitation
Attacking the Authentication Layer - a SAML Use Case
Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress
Attacking IoT Devices - Command Injection and Path Traversal
Attacking Electron JavaScript Applications - from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)
Attacking Ethereum Smart Contracts - Reentrancy, Weak Sources of Randomness, and Business Logic
Continuing the Journey of Vulnerability Discovery

最近チェックした商品