Hands-on Penetration Testing for Web Applications - 2nd Edition
eBook - ePub

Hands-on Penetration Testing for Web Applications - 2nd Edition

Web security testing on modern applications (English Edition)

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Hands-on Penetration Testing for Web Applications - 2nd Edition

Web security testing on modern applications (English Edition)

About this book

Description
Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications.Covering a diverse array of topics, this book provides a comprehensive overview of web application security testing methodologies. Each chapter offers key insights and practical applications that align with the objectives of the course. Students will explore critical areas such as vulnerability identification, penetration testing techniques, using open-source pen test management and reporting tools, testing applications hosted on cloud, and automated security testing tools. Throughout the book, readers will encounter essential concepts and tools such as OWASP Top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), authentication and authorization testing, and secure configuration practices. With a focus on real-world applications, students will develop critical thinking skills, problem-solving abilities, and a security-first mindset required to address the challenges of modern web application threats.With a deep understanding of security vulnerabilities and testing solutions, students will have the confidence to explore new opportunities, drive innovation, and make informed decisions in the rapidly evolving field of cybersecurity.

Key Features
? Exciting coverage on vulnerabilities and security loopholes in modern web applications.
? Practical exercises and case scenarios on performing pen testing and identifying security breaches.
? This new edition brings enhanced cloud security coverage and comprehensive penetration test management using AttackForge for streamlined vulnerability, documentation, and remediation.

What you will learn
? Navigate the complexities of web application security testing.
? An overview of the modern application vulnerabilities, detection techniques, tools, and web penetration testing methodology framework.
? Contribute meaningfully to safeguarding digital systems.
? Address the challenges of modern web application threats.
? This edition includes testing modern web applications with emerging trends like DevSecOps, API security, and cloud hosting.
? This edition brings DevSecOps implementation using automated security approaches for continuous vulnerability remediation.

Who this book is for
The target audience for this book includes students, security enthusiasts, penetration testers, and web application developers. Individuals who are new to security testing will be able to build an understanding about testing concepts and find this book useful. People will be able to gain expert knowledge on pentesting tools and concepts.

Table of Contents
1. Introduction to Security Threats
2. Web Application Security Essentials
3. Web Pentesting Methodology
4. Testing Authentication Failures
5. Testing Secure Session Management
6. Testing Broken Access Control
7. Testing Sensitive Data Exposure
8. Testing Secure Data Validation
9. Techniques to Attack Application Users
10. Testing Security Misconfigurations
11. Automating Security Attacks
12. Penetration Testing Tools
13. Pen Test Management and Reporting
14. Defense In Depth
15. Security Testing in Cloud

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Hands-on Penetration Testing for Web Applications - 2nd Edition by Richa Gupta in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication Page
  5. About the Author
  6. About the Reviewer
  7. Acknowledgement
  8. Preface
  9. Table of Contents
  10. 1. Introduction to Security Threats
  11. 2. Web Application Security Essentials
  12. 3. Web Pentesting Methodology
  13. 4. Testing Authentication Failures
  14. 5. Testing Secure Session Management
  15. 6. Testing Broken Access Control
  16. 7. Testing Sensitive Data Exposure
  17. 8. Testing Secure Data Validation
  18. 9. Techniques to Attack Application Users
  19. 10. Testing Security Misconfigurations
  20. 11. Automating Security Attacks
  21. 12. Penetration Testing Tools
  22. 13. Pen Test Management and Reporting
  23. 14. Defense In Depth
  24. 15. Security Testing in Cloud
  25. Index