Hot Downloads

How to Break Web Software

Written by Administrator. Posted in Network Management & Administration

1 1 1 1 1 1 Rating 1.00 (1 Vote)
How to Break Web Software - 1.0 out of 5 based on 1 vote

Title:              How to Break Web Software
Authors:        Mike Andrews, James A. Whittaker
ISBN-10(13):     0321369440
Publisher:      Addison-Wesley Professional
Published:     February 12, 2006
Edition:         1st Edition
Language:     English


star-4   buy-now

How to break web software

This is a focussed book with a single aim; to help you find and correct common vulnerabilities in web-based applications and website software.

Above all, this is a book to be used. The authors take a practical approach to each area of consideration, and the chapters are well structured to make it easy for you to get right to work. For each area they provide an informative overview followed by discussion of the vulnerabilities including numerous code snippets, examples and screen shots. Though rich in detail the writing style keeps you engaged and the sensible structure (when to apply the attack, how to perform it and how to protect against it) makes it easy to grasp the key points. There is no bias towards either Windows or Unix products on either the client or the server, and you won't need to be a scripting expert to put the authors' ideas into practice.

Chapter 1 explains the difference between web-based and traditional client-server systems and why a different approach is needed when testing.

Subsequent chapters cover the vulnerabilities:

- Gathering Information on the Target.

- Bypassing Client-Side Validation.

- State-Based Attacks, including Hidden Fields, Cookie poisoning and Session Hijacking.

- Data Attacks, including Cross-Site Scripting, SQL Injection and Directory Traversal.

- Language-Based Attacks, including Buffer Overflows.

- Server Attacks, including Stored Procedures, SQL Injection, Server Fingerprinting and Denial of Service.

- Authentication, including Weak Cryptography and Cross-Site Tracing.

- Privacy, including Caching, Cookies, Web Bugs, ActiveX Controls and Browser Help Objects.

- Web Services, including WSDL and XML attacks.

The book comes with an excellent companion CD containing a number of testing tools and a flawed website on which you can use the techniques you have learned to cement your knowledge. Both the tools and the vulnerabilities in the sample site are fully documented in two useful appendices.

All in all, a rich and well-focussed yet accessible introduction to a wide-ranging subject. If the security of web-based applications is your area, make room for this on your bookshelf.



Articles To Read Next:


Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V


  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup