EUR 33,94
  • Tous les prix incluent la TVA.
Il ne reste plus que 14 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
The Web Application Hacke... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (Anglais) Broché – 7 octobre 2011

5.0 étoiles sur 5 2 commentaires client

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 33,94
EUR 30,94 EUR 41,58
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Produits fréquemment achetés ensemble

  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • +
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes.
  • +
  • Rtfm: Red Team Field Manual
Prix total: EUR 75,58
Acheter les articles sélectionnés ensemble

Descriptions du produit

Présentation de l'éditeur

The highly successful security book returns with a new edition, completely updated

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step–by–step techniques for attacking and defending the range of ever–evolving web applications. You′ll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

  • Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
  • Discusses new remoting frameworks, HTML5, cross–domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
  • Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks

Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.

Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Etical Hacking and Web Hacking Set, 9781119072171.

Quatrième de couverture

New technologies. New attack techniques. Start hacking.

Web applications are everywhere, and they′re insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it.

This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today′s complex and highly functional applications. Roll up your sleeves and dig in.

  • Discover how cloud architectures and social networking have added exploitable attack surfaces to applications

  • Leverage the latest HTML features to deliver powerful cross–site scripting attacks

  • Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks

  • Learn how to break encrypted session tokens and other sensitive data found in cloud services

  • Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack applications and compromise users

  • Learn new techniques for automating attacksand dealing with CAPTCHAs and cross–site request forgery tokens

  • Steal sensitive data across domains using seemingly harmless application functions and new browser features

Find help and resources at http://mdsec.net/wahh

  • Source code for some of the scripts in the book

  • Links to tools and other resources

  • A checklist of tasks involved in most attacks

  • Answers to the questions posed in each chapter

  • Hundreds of interactive vulnerability labs

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit


Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
2
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoile
0
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché Achat vérifié
Extrêmement complet. Beaucoup plus que beaucoup d'autres. Ce livre (en anglais) parcours les techniques de manière proche de l'exhaustif mais explique aussi les différents moyens de contrer les contre mesures. Et donc de s'en prémunir.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
Excellent livre pour les débutants. D'ailleurs j'avais déjà lu la première edition et j'attends la troisième avec impatience.
Je le recommende.
Remarque sur ce commentaire Une personne a trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.3 étoiles sur 5 62 commentaires
19 internautes sur 19 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Good but not so ethical 5 septembre 2014
Par Furkan CALISKAN - Publié sur Amazon.com
Format: Broché Achat vérifié
If this creepy lab thing didn't exist, I would rate 4 or 5 stars for this book since book contains a lot of real-world best-practises. But authors designed the material by assuming 'every reader can afford 7$ per hour for our labs', this destroys the overall quality.

Since you're a new-learner for some advanced stuff, you need to do it on the lab. First, you pay 35$ (yes there is minimum credit requirement for 5 credits for your first order(!)) but for example when you're stuck in an example and can't finish your experiment, you kind of waste your very expensive credits. The feeling that you are missing something is bad because you know you can't afford (7$ per hour, really!) till all things are clear!

Also there isn't any 'pause your session' option for your lab sessions. If you start, you must finish it! This is ridiculous...

I want to be optimistic about labs; yeah, there are fees for servers and bandwidth, but I think, if their plan is teaching good rather than making more money, they could provide all the ASP.NET source codes and problem solutions for the labs on their site, but it isn't.

As a result; give it a chance, it has some great content in it but this lab things will make you nervous.
16 internautes sur 16 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 It is one of the best books for web application hacking but no answer key for labs. 18 mars 2014
Par Jason Z. - Publié sur Amazon.com
Format: Broché Achat vérifié
First off, one of the authors of the book is the person who made burpsuite. It becomes quite clear you actually need to purchase burpsuite pro if you want to follow all of the hack steps in the book or understand a lot of the things they are talking about that aren't shown in the burpsuite free edition. The real problem for me is that it leads you to their lab which you have to pay $7 an hour for 1 hour increments. You have to take that full increment each time you want to practice. You can't stop your time so you have to take that full hour. You can imagine how quickly that would add up. Not a big deal if you read all the chapter and then try it out. Problem is when you are doing the hack steps there isn't a defined answer key for it. For example:

Step 1. Locate all instances within the application where hidden form fields, cookies, and URL parameters are apparently being used to transmit data via the client.

Step 2. Attempt to determine or guess the role that the item plays in the a application's logic, based on the context in which it appears and on clues such as the parameter's name.

Step 3. Modify the item's value in ways that are .... and so on.

Ok. So I THINK I found what I was looking for but I'm not 100% sure. How do I find the answers to make sure. ??????

So the BIGGEST problem for me with each of these "hack steps" is that there isn't an answer key. They should have something like "You should have found <answer here> on this page by performing these steps. Maybe something on the lab site to show you or pictures or something. Nothing is found for this for their labs. Showing an automated slide of them performing it would of helped.

So once you hit chapter 4 you better buckle up because like another reviewer said it gets C.I.P.U. (clear if previously understood) real quick. Great book for intermediate-advanced people with webapp/security experience. I certainly wouldn't recommend it for beginners. I am still going through it but I thought the labs were really discouraging. The material is great and very relevant though. I think the labs could of done a lot better in my opinion.
3 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Comprehensive Look At Website Security 23 octobre 2016
Par William P Ross - Publié sur Amazon.com
Format: Broché Achat vérifié
This book offers tons of techniques and strategies for attacking and defending web applications. The beginning chapters discuss the major components of websites and their vulnerabilites.

The middle of the book gets much more specific showing "Hack Steps" for different components like the client side, sessions, databases, and authentication.

Sections about custom code development show how you can develop your own solution to probe a web app. There were code examples in different languages such as JavaScript, C++, Java, and ASP.NET. The authors highlight many kinds of tools you can use to learn more about a website, including a product they developed themselves called Burp Suite.

For readers interested in the testing the techniques there is a website offered by the book but it costs $7 an hour to play around on the site. This fee is for keeping the website running apparently, but I thought it would make more sense to have a monthly fee. I did not subscribe to this site myself though because I was more interested in getting a broad overview of website security.

The book is showing its 2011 publication date in some places. For example, IE and Firefox are said to be the dominant browsers while Chrome is a minor player. Additionally, Flash and Silverlight are spoken of as being components of many websites. One issue was I was not really sure where techniques might be outdated and others are still relevant.

I would definitely be interested in a 3rd edition for this book. The authors presented a solid foundation for learning about website security.
12 internautes sur 12 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Bottom line: buy it 8 avril 2013
Par D. Ellis - Publié sur Amazon.com
Format: Broché Achat vérifié
Reading this book up to around page 600 made me seriously question how anyone could give it less than 5 stars. The amount of knowledge it gave me for a mere $25 is absolutely astounding. I was eagerly waiting to finish it so I could come review it.

Then I finished it, and I understood some of the criticisms. It starts to feel like it's repeating itself after a while, and the product placement for Burp start to become a bit more annoying.

Still, the rest of the book is chock full of great, detailed information. If you're like me and had a basic understanding of how SQL injection worked, but wanted to get a deeper look, this book is perfect. If you chopped off the last 200 pages you would have a book that was STILL worth well over $25. It's hard for me to give it less than 5 stars when my major complaint is that it gives too much information.

Bottom line: if you're a beginner or intermediate to web application security and you're wondering whether you should buy this, just do it. You won't be disappointed.
64 internautes sur 67 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The Book That Keeps on Giving... 14 octobre 2011
Par Jason Haddix - Publié sur Amazon.com
Format: Broché Achat vérifié
There's a running joke we have on our assessment team about the Web Application Hackers Handbook. Every time we see a new technology, or have to deal with a one-off situation, we start doing research online only to find it was already referenced in WAHH somewhere. We've all read this book several times too, it's like Dafydd and Marcus sneak into our houses at night and add content...

Joking aside though, there is no other reference for web hacking as thorough or complete as WAHH.

With WAHH2 the authors added a significant amount content and rehashed existing chapters that were already deeply technical. The bonus in WAHH2 is its associated labs. Dafydd and Marcus have been giving a live WAHH training for years and have now moved the stellar CTF like challenges to the cloud. You can buy credits ($7 for 1hr) and move right along as you read the book (MDSec.net). When I say the labs are stellar, I mean it. The labs come almost straight from the class and start trivial and then get crazy. The injection labs were by far my favorite, housing 30-40 different injection types/variants each between XSS/SQLi. The CTF in the class (which i'll mention again is where the MDSec.com labs are based from) gets ridiculous toward the end. Even seasoned web testers fall around questions 14-16. But i digress...

WAHH2 is now the defacto buy for any pentest/QA/Audit team. Its usage will surpass any other book on your bookshelf if you are doing practical testing.

5 stars, i'd give it 10 if I could.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?