Penetration Testing with Java
eBook - ePub

Penetration Testing with Java

A step-by-step pen testing handbook for Java applications (English Edition)

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Penetration Testing with Java

A step-by-step pen testing handbook for Java applications (English Edition)

About this book

Description
The book provides a comprehensive exploration of Java security and penetration testing, starting with foundational topics such as secure coding practices and the OWASP Top 10 for web applications. The early chapters introduce penetration testing methodologies, including Java web application-specific mapping and reconnaissance techniques. The gathering of information through OSINT and advanced search techniques is highlighted, laying the crucial groundwork for testing. Proxy tools like Burp Suite and OWASP Zap are shown, offering insights into their configurations and capabilities for web application testing.Each chapter does a deep dive into specific vulnerabilities and attack vectors associated with Java web and mobile applications. Key topics include SQL injection, cross-site scripting (XSS), authentication flaws, and session management issues. Each chapter supplies background information, testing examples, and practical secure coding advice to prevent these vulnerabilities. There is a distinct focus on hands-on testing methodologies, which prepares readers for real-world security challenges.By the end of this book, you will be a confident Java security champion. You will understand how to exploit vulnerabilities to mimic real-world attacks, enabling you to proactively patch weaknesses before malicious actors can exploit them.

Key Features
? Learn penetration testing basics for Java applications.
? Discover web vulnerabilities, testing techniques, and secure coding practices.
? Explore Java Android security, SAST, DAST, and vulnerability mitigation.

What you will learn
? Study the OWASP Top 10 and penetration testing methods.
? Gain secure coding and testing techniques for vulnerabilities like XSS and CORS.
? Find out about authentication, cookie management, and secure session practices.
? Master access control and authorization testing, including IDOR and privilege escalation.
? Discover Android app security and tools for SAST, DAST, and exploitation.

Who this book is for
This book is for Java developers, software developers, application developers, quality engineers, software testing teams, and security analysts. Prior knowledge of Java is required. Some application security knowledge is helpful.

Table of Contents
1. Introduction: Java Security, Secure Coding, and Penetration Testing
2. Reconnaissance and Mapping
3. Hands-on with Web Proxies
4. Observability with SQL Injections
5. Misconfiguration with Default Values
6. CORS Exploitation
7. Exploring Vectors with DoS Attacks
8. Executing Business Logic Vulnerabilities
9. Authentication Protocols
10. Session Management
11. Authorization Practices
12. Java Deserialization Vulnerabilities
13. Java Remote Method Invocation Vulnerabilities
14. Java Native Interface Vulnerabilities
15. Static Analysis of Java Android Applications
16. Dynamic Analysis of Java Android Applications
17. Network Analysis of Java Android Applications
Appendix

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Penetration Testing with Java by Nancy Snoke in PDF and/or ePUB format, as well as other popular books in Computer Science & Programming in Java. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication Page
  5. About the Author
  6. About the Reviewers
  7. Acknowledgement
  8. Preface
  9. Table of Contents
  10. 1. Introduction: Java Security, Secure Coding, and Penetration Testing
  11. 2. Reconnaissance and Mapping
  12. 3. Hands-on with Web Proxies
  13. 4. Observability with SQL Injections
  14. 5. Misconfiguration with Default Values
  15. 6. CORS Exploitation
  16. 7. Exploring Vectors with DoS Attacks
  17. 8. Executing Business Logic Vulnerabilities
  18. 9. Authentication Protocols
  19. 10. Session Management
  20. 11. Authorization Practices
  21. 12. Java Deserialization Vulnerabilities
  22. 13. Java Remote Method Invocation Vulnerabilities
  23. 14. Java Native Interface Vulnerabilities
  24. 15. Static Analysis of Java Android Applications
  25. 16. Dynamic Analysis of Java Android Applications
  26. 17. Network Analysis of Java Android Applications
  27. Appendix
  28. Index