[Webmaster E-books] Web Hacking: Attacks and Defense

Posted by Mohd Hasnun Hisyam On Thursday, July 29, 2010 0 comments


Part One, The E-Commerce Playground, contains five chapters.

• Chapter 1, Web Languages: The Babylon of the 21st Century—discusses all the major Web languages used on the Internet today.

• Chapter 2, Web and Database Servers—discusses the technologies behind the Web and how they introduce vulnerabilities.

• Chapter 3, Shopping Carts and Payment Gateways—discusses the technologies behind online shopping carts and E-commerce sites on the Web.

• Chapter 4, HTTP and HTTPS: The Hacking Protocols—discusses the two main protocols used to direct Web and E-commerce traffic on the Internet.

• Chapter 5, URL: The Web Hacker’s Sword—discusses understanding everything about a Web site just from reading the URL.

Part Two, URLs Unraveled, contains three chapters.

• Chapter 6, Web: Under(the)Cover—discusses the details of a complete Web application, including all its components and dependencies.

• Chapter 7, Reading Between the Lines—discusses the fine art of disclosing source in a Web browser or alternative interface.

• Chapter 8, Site Linkage Analysis—discusses how attackers inventory a Web site to understand the application as a whole and how to attack it.

Part Three, How Do They Do It?, contains six chapters.

• Chapter 9, Cyber Grafitti—discusses how attackers deface Web sites, their techniques, and their tricks.

• Chapter 10, E-Shoplifting—discusses how attackers commit online shoplifting by tricking an application to give them merchandise at a lower price.

• Chapter 11, Database Access—discusses how attackers break into Web applications through the database.

• Chapter 12, Java: Remote Command Execution—discusses how attackers use Java as a mechanism for breaking into a system.

• Chapter 13, Impersonation—discusses how an attacker can take on another user’s identity.

• Chapter 14, Buffer Overflows: On-the-Fly—discusses how an attacker can identify and create overflows in an application.

Part Four, Advanced Web Kung Fu, contains the final three chapters.

• Chapter 15, Web Hacking: Automated Tools—discusses the tools and techniques that hackers use to perform many of their tricks in an automated fashion.

• Chapter 16, Worms—discusses the deadly worm and how it is created, propagated, and removed.

• Chapter 17, Beating the IDS—discusses how IDS can help and hurt a hunt for an attacker.

Download link from mediafire.com:

Web Hacking: Attacks and Defense



No comments:

Post a Comment