Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications


Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
By 作者: Sanjib Sinha
ISBN-10 书号: 1484253906
ISBN-13 书号: 9781484253908
Edition 版本: 1st ed.
Release Finelybook 出版日期: 2019-11-13
pages 页数: (225 )

The Book Description robot was collected from Amazon and arranged by Finelybook
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it.
You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications.
What You Will Learn

Implement an offensive approach to bug hunting
Create and manage request forgery on web pages
Poison Sender Policy Framework and exploit it
Defend against cross-site scripting (XSS) attacks
Inject headers and test URL redirection
Work with malicious files and command injection
Resist strongly unintended XML attacks

1. Introduction to Hunting Bugs
2. Setting Up Your Environment
3. How to Inject Request Forgery
4. How to Exploit Through Cross-Site Scripting (XSS)
5. Header Injection and URL Redirection
6. Malicious Files
7. Poisoning Sender Policy Framework
8. Injecting Unintended XML
9. Finding Command Injection Vulnerabilities
10. Finding HTML and SQL Injection Vulnerabilities

下载地址 DOWNLOAD隐藏内容需1积分,请先!没有帐号? 注 册 一个!
觉得文章有用就打赏一下文章作者
未经允许不得转载:finelybook » Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
分享到: 更多 (0)

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

微信扫一扫打赏