Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Paperback – 2011
"Enlightenment Now: The Case for Reason, Science, Humanism, and Progress"
Is the world really falling apart? Is the ideal of progress obsolete? Cognitive scientist and public intellectual Steven Pinker urges us to step back from the gory headlines and prophecies of doom, and instead, follow the data: In seventy-five jaw-dropping graphs, Pinker shows that life, health, prosperity, safety, peace, knowledge, and happiness are on the rise. Learn more
Customers who bought this item also bought
Customers who viewed this item also viewed
What other items do customers buy after viewing this item?
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. · introduction · web application (in)security · core defense mechanisms · web application technologies · mapping the application · bypassing client-side controls · attacking authentication · attacking session management · attacking access controls · attacking data stores · attacking back-end components · attacking application logic · attacking users: cross-site scripting · attacking users: other techniques · automating customized attacks · exploiting information disclosure · attacking native compiled applications · attacking application architecture · attacking the application server · finding vulnerabilities in source code · a web application hacker's toolkit · a web application hacker's methodology
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Since you're a new-learner for some advanced stuff, you need to do it on the lab. First, you pay 35$ (yes there is minimum credit requirement for 5 credits for your first order(!)) but for example when you're stuck in an example and can't finish your experiment, you kind of waste your very expensive credits. The feeling that you are missing something is bad because you know you can't afford (7$ per hour, really!) till all things are clear!
Also there isn't any 'pause your session' option for your lab sessions. If you start, you must finish it! This is ridiculous...
I want to be optimistic about labs; yeah, there are fees for servers and bandwidth, but I think, if their plan is teaching good rather than making more money, they could provide all the ASP.NET source codes and problem solutions for the labs on their site, but it isn't.
As a result; give it a chance, it has some great content in it but this lab things will make you nervous.
Step 1. Locate all instances within the application where hidden form fields, cookies, and URL parameters are apparently being used to transmit data via the client.
Step 2. Attempt to determine or guess the role that the item plays in the a application's logic, based on the context in which it appears and on clues such as the parameter's name.
Step 3. Modify the item's value in ways that are .... and so on.
Ok. So I THINK I found what I was looking for but I'm not 100% sure. How do I find the answers to make sure. ??????
So the BIGGEST problem for me with each of these "hack steps" is that there isn't an answer key. They should have something like "You should have found <answer here> on this page by performing these steps. Maybe something on the lab site to show you or pictures or something. Nothing is found for this for their labs. Showing an automated slide of them performing it would of helped.
So once you hit chapter 4 you better buckle up because like another reviewer said it gets C.I.P.U. (clear if previously understood) real quick. Great book for intermediate-advanced people with webapp/security experience. I certainly wouldn't recommend it for beginners. I am still going through it but I thought the labs were really discouraging. The material is great and very relevant though. I think the labs could of done a lot better in my opinion.
The advantage of this book (and now the new version even more so) is in the way it breaks down the topics. Many books sort of jump around with their various sections, while the WAHH takes the precise line that I think is best when building on one's understanding of this topic.
The updated material is significant, and definitely worth the re-purchase. I bought both the dead-tree and the Kindle version.
100% definitely recommended.
Joking aside though, there is no other reference for web hacking as thorough or complete as WAHH.
With WAHH2 the authors added a significant amount content and rehashed existing chapters that were already deeply technical. The bonus in WAHH2 is its associated labs. Dafydd and Marcus have been giving a live WAHH training for years and have now moved the stellar CTF like challenges to the cloud. You can buy credits ($7 for 1hr) and move right along as you read the book (MDSec.net). When I say the labs are stellar, I mean it. The labs come almost straight from the class and start trivial and then get crazy. The injection labs were by far my favorite, housing 30-40 different injection types/variants each between XSS/SQLi. The CTF in the class (which i'll mention again is where the MDSec.com labs are based from) gets ridiculous toward the end. Even seasoned web testers fall around questions 14-16. But i digress...
WAHH2 is now the defacto buy for any pentest/QA/Audit team. Its usage will surpass any other book on your bookshelf if you are doing practical testing.
5 stars, i'd give it 10 if I could.
The only thing I would change would be the title. Due to the effects on the populace by popular culture, I feel a little uncomfortable reading this at the laundromat!