Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
Autor Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsayen Limba Engleză Paperback – 12 ian 2011
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets
- Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities
- Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more
Preț: 202.46 lei
Preț vechi: 253.08 lei
-20% Nou
Puncte Express: 304
Preț estimativ în valută:
38.75€ • 40.25$ • 32.18£
38.75€ • 40.25$ • 32.18£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597496049
ISBN-10: 1597496049
Pagini: 296
Ilustrații: 25 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.6 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597496049
Pagini: 296
Ilustrații: 25 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.6 kg
Editura: ELSEVIER SCIENCE
Public țintă
Penetration testers, security consultants; IDS Developers; Security Tool Developers; WAF Implementers and Maintainers; Web Developers; and Sys/Net AdminsCuprins
Chapter 1: Introduction Chapter 2: HTML Chapter 3: JavaScript and VBScript Chapter 4: Nonalphanumeric JavaScript Chapter 5: CSS Chapter 6: PHP Chapter 7: SQL Chapter 8: Web Application Firewalls and Client-side Filters Chapter 9: Mitigating Bypasses and Attacks Chapter 10: Future Developments
Recenzii
"As the data stored in Web application systems becomes critical to business, the attacks against them are becoming increasingly complex. If you want to move your understanding beyond 'or 1=1--' this book provides the knowledge needed to bypass both filters and detection, crucial for both attack and defence." -- Andrew Waite, Security Researcher, InfoSanity Research
"Intended for advanced network security administrators, penetration testers and web application developers, this guide to web obfuscation presents an in depth technical discussion of the latest methods in site intrusion and Internet attacks. Chapters examine state of the art obfuscation attacks on major website components such as HTML, JavaScript and VBScript, CSS, PHP, SQL and web application firewalls. A final chapter discusses future problems such as the new HTML 5 standards and plug-in vulnerabilities. Chapters include numerous code examples in a variety of languages and formats. Heiderich is a web developer, Nava is a security researcher for Google, Heyes is a security contractor and Lindsay is a security consultant."--SciTechBookNews
"This is a very frightening book and I would advise any security architect to purchase a copy. It’s aimed at the bleeding edge of the technical security market, however, it really does hammer home how difficult security can become when faced with complex applications and protocols. The techniques used in the book are not trivial, but they do show us that the age of the firewall and the IDS may well be over, and the age of security by design has only just begun."--InfoSecReviews.com
"This is a deep technical read and anyone buying it should have a solid understanding of web technologies and some experience of web programming. I would say it is targeted at penetration testers and security architects, but to the security generalist it also opens up new frontiers when it comes to designing for security."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards
"Intended for advanced network security administrators, penetration testers and web application developers, this guide to web obfuscation presents an in depth technical discussion of the latest methods in site intrusion and Internet attacks. Chapters examine state of the art obfuscation attacks on major website components such as HTML, JavaScript and VBScript, CSS, PHP, SQL and web application firewalls. A final chapter discusses future problems such as the new HTML 5 standards and plug-in vulnerabilities. Chapters include numerous code examples in a variety of languages and formats. Heiderich is a web developer, Nava is a security researcher for Google, Heyes is a security contractor and Lindsay is a security consultant."--SciTechBookNews
"This is a very frightening book and I would advise any security architect to purchase a copy. It’s aimed at the bleeding edge of the technical security market, however, it really does hammer home how difficult security can become when faced with complex applications and protocols. The techniques used in the book are not trivial, but they do show us that the age of the firewall and the IDS may well be over, and the age of security by design has only just begun."--InfoSecReviews.com
"This is a deep technical read and anyone buying it should have a solid understanding of web technologies and some experience of web programming. I would say it is targeted at penetration testers and security architects, but to the security generalist it also opens up new frontiers when it comes to designing for security."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards