
- 280 pages
- English
- PDF
- Available on iOS & Android
About this book
This innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities. The book focuses on offensive security and how to attack web applications. It describes each of the Open Web Application Security Project (OWASP) top ten vulnerabilities, including broken authentication, cross-site scripting and insecure deserialization, and details how to identify and exploit each weakness. Readers learn to bridge the gap between high-risk vulnerabilities and exploiting flaws to get shell access. The book demonstrates how to work in a professional services space to produce quality and thorough testing results by detailing the requirements of providing a best-of-class penetration testing service. It offers insight into the problem of not knowing how to approach a web app pen test and the challenge of integrating a mature pen testing program into an organization. Based on the author's many years of first-hand experience, this book provides examples of how to break into user accounts, how to breach systems, and how to configure and wield penetration testing tools.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Preface
- 1 Introduction
- 2 OWASP A1:2017 Injection
- 3 OWASP A2:2017 Broken Authentication
- 4 OWASP A3:2017 Sensitive Data Exposure
- 5 OWASP A4:2017 XML External Entities (XXE)
- 6 OWASP A5:2017 Broken Access Control
- 7 OWASP A6:2017 Security Misconfiguration
- 8 OWASP A7:2017 Cross-Site Scripting (XSS)
- 9 OWASP A8:2017 Insecure Deserialization
- 10 OWASP A9:2017 Using COmponents with Known Vulnerabilities
- 11 OWASP A10:2017 Insufficient Logging and Monitoring
- 12 Beyond OWASP Top 10
- 13 Testing as a Consultant and Adding Value
- About the Author
- Index