
- 353 pages
- English
- PDF
- Available on iOS & Android
A Beginner's Guide To Web Application Penetration Testing
About this book
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book, Ali takes a dual approachâemphasizing both theory and practical skillsâequipping you to jumpstart a new career in web application security.
You'll learn about common vulnerabilities and how to perform a variety of effective attacks on web applications. Consistent with the approach publicized by the Open Web Application Security Project (OWASP), the book explains how to find, exploit and combat the ten most common security vulnerability categories, including broken access controls, cryptographic failures, code injection, security misconfigurations, and more.
A Beginner's Guide to Web Application Penetration Testing walks you through the five main stages of a comprehensive penetration test: scoping and reconnaissance, scanning, gaining and maintaining access, analysis, and reporting. You'll also discover how to use several popular security tools and techniquesâlike as well as:
- Demonstrations of the performance of various penetration testing techniques, including subdomain enumeration with Sublist3r and Subfinder, and port scanning with Nmap
- Strategies for analyzing and improving the security of web applications against common attacks, including
- Explanations of the increasing importance of web application security, and how to use techniques like input validation, disabling external entities to maintain security
Perfect for software engineers new to cybersecurity, security analysts, web developers, and other IT professionals, A Beginner's Guide to Web Application Penetration Testing will also earn a prominent place in the libraries of cybersecurity students and anyone else with an interest in web application security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Acknowledgments
- About the Author
- Contents at a Glance
- Contents
- Foreword
- Introduction
- Chapter 1 Introduction to Web Application Penetration Testing
- Chapter 2 Setting Up Your Penetration Testing Environment
- Chapter 3 Reconnaissance and Information Gathering
- Chapter 4 Cross-Site Scripting
- Chapter 5 SQL Injection
- Chapter 6 Cross-Site Request Forgery
- Chapter 7 Server-Side Attacks and Open Redirects
- Chapter 8 XML-Based Attacks
- Chapter 9 Authentication and Authorization
- Chapter 10 API Attacks
- Appendix A Best Practices and Standards
- Appendix B CWE and CVSS Score
- Appendix C Writing Effective and Comprehensive Penetration Testing Reports
- Index
- EULA