Encyclopedia of web security exploits:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[Scotts Valley]
[Createspace]
[2016]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 158 Seiten |
ISBN: | 9781532859496 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047019283 | ||
003 | DE-604 | ||
005 | 20201202 | ||
007 | t | ||
008 | 201119s2016 |||| 00||| eng d | ||
020 | |a 9781532859496 |9 978-1-5328-5949-6 | ||
035 | |a (OCoLC)1225884430 | ||
035 | |a (DE-599)BVBBV047019283 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kaswell, William |e Verfasser |4 aut | |
245 | 1 | 0 | |a Encyclopedia of web security exploits |c William Kaswell |
264 | 1 | |a [Scotts Valley] |b [Createspace] |c [2016] | |
300 | |a 158 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032426773&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032426773 |
Datensatz im Suchindex
_version_ | 1804181982457888768 |
---|---|
adam_text | Contents . Ji.ttvBmiiothei į Passau 1 2 3 4 BREACH (security exploit) 1 1.1 Details................................................................................................................................................................ 1 1.2 Mitigation......................................................................................................................................................... 1 1.3 References ...................................................................................................................................................... 1 1.4 External links................................................................................................................................................... 1 Browser exploit 2 2.1 Symptoms......................................................................................................................................................... 2 2.2 Prevention......................................................................................................................................................... 2 2.3 Notable browser exploits ................................................................................................................................ 2 2.4 See also............................................................................................................................................................. 2 2.5 External
links................................................................................................................................................... 2 Browser security 3 3.1 Security............................................................................................................................................................ 3 3.1.1 ...................................................................................................................... 4 3.2 Password security model................................................................................................................................... 4 3.3 Privacy................................................................................................................................................................ 4 3.3.1 ................................................................................................................................................... 4 3.4 Hardware browser............................................................................................................................................. 4 3.5 Browser hardening............................................................................................................................................. 5 3.6 See also............................................................................................................................................................. 5 3.7
References......................................................................................................................................................... 5 Plugins and extensions Flash Clickjacking 7 4.1 Description...................................................................................................................................................... 7 4.2 Examples......................................................................................................................................................... 7 4.2.1 Likejacking.......................................................................................................................................... 8 4.2.2 Cursorjacking...................................................................................................................................... 8 4.2.3 Password manager attack................................................................................................................... 8 і
CONTENTS ii 4.3 5 6 7 8 Prevention......................................................................................................................................................... 8 4.3.1 Client-side ......................................................................................................................................... 8 4.3.2 Server-side......................................................................................................................................... 9 4.4 See also............................................................................................................................................................ 9 4.5 References......................................................................................................................................................... 9 4.6 External links................................................................................................................................................... 10 Content Security Policy 11 5.1 Status................................................................................................................................................................ 11 5.2 Mode of operation............................................................................................................................................ 12 5.2.1 Notes..................................................................................................................................... 12 5.3
Reporting......................................................................................................................................................... 12 5.4 Browser add-ons and extensions exemption................................................................................................... 12 5.5 See also............................................................................................................................................................ 13 5.6 References......................................................................................................................................................... 13 5.7 External links................................................................................................................................................... 14 Content sniffing 15 6.1 Charset sniffing................................................................................................................................................ 15 6.2 References ...................................................................................................................................................... 15 6.3 External links................................................................................................................................................... 16 Cookie stuffing 17 7.1 Process ............................................................................................................................................................ 17 7.2 User-generated
content................................................................................................................................... 17 7.3 Techniques ...................................................................................................................................................... 17 7.3.1 Pop-ups................................................................................................................................................ 17 7.3.2 Frames and Iframes............................................................................................................................. 18 7.3.3 Images ................................................................................................................................................ 18 7.3.4 JavaScript............................................................................................................................................. 18 7.3.5 Stylesheets ......................................................................................................................................... 18 7.3.6 Flash ................................................................................................................................................... 18 7.4 See also............................................................................................................................................................ 18 7.5
References......................................................................................................................................................... 18 Cookiemonster attack 19 8.1 Notes................................................................................................................................................................ 19 8.2 References......................................................................................................................................................... 19 9 Cross-site cooking 20
iii CONTENTS 9.1 Origins ............................................................................................................................................................ 9.2 References ...................................................................................................................................................... 20 9.3 External links................................................................................................................................................... 20 10 Cross-site request forgery 20 21 10.1 History................................................................................................................................................................ 21 10.2 Example and characteristics............................................................................................................................. 21 10.3 Forging login requests...................................................................................................................................... 22 10.4 HTTP verbs and CSRF................................................................................................................................... 22 10.5 Other approaches to CSRF............................................................................................................................. 23 10.6 Effects................................................................................................................................................................ 23 10.7 Limitations
...................................................................................................................................................... 23 10.8 Prevention......................................................................................................................................................... 23 10.8.1 Synchronizer token pattern................................................................................................................ 23 10.8.2 Cookie-to-Header Token................................................................................................................... 24 10.8.3 Client side safeguards......................................................................................................................... 24 10.8.4 Other techniques................................................................................................................................ 24 10.9 See also............................................................................................................................................................. 25 lO.lOReferences......................................................................................................................................................... 25 10.11 External links.................................................................................................................................................. 26 10.11.1 Examples and implementations.......................................................................................................... 26
10.11.2 Blogs and articles................................................................................................................................ 26 11 Cross-site scripting 27 11.1 Background...................................................................................................................................................... 27 11.2 Types................................................................................................................................................................ 27 11.2.1 Reflected (non-persistent)................................................................................................................... 27 11.2.2 Persistent............................................................................................................................................. 28 11.2.3 Server-side versus DOM-based vulnerabilities................................................................................ 28 11.3 Exploit examples ............................................................................................................................................. 11.3.1 Non-persistent 29 ................................................................................................................................... 29 11.3 Persistent attack................................................................................................................................... 30 11.4 Preventive
measures......................................................................................................................................... 30 11.4.1 Contextual output encoding/escaping of string input...................................................................... 30 11.4.2 Safely validating untrusted HTML input.......................................................................................... 30 11.4.3 Cookie security................................................................................................................................... 30 11.4.4 Disabling scripts ................................................................................................................................ 30 11.4.5 Emerging defensive technologies...................................................................................................... 31 11.5 Scanning service ............................................................................................................................................. 31
CONTENTS IV 11.6 Related vulnerabilities...................................................................................................................................... 31 11.7 See also............................................................................................................................................................ 32 11.8 References......................................................................................................................................................... 32 11.9 Further reading................................................................................................................................................ 33 11.10External links................................................................................................................................................... 33 12 Cross-site tracing 34 12.1 External links................................................................................................................................................... 13 Cross-zone scripting 34 35 13.1 Origins of the zone concept............................................................................................................................. 35 13.2 Examples......................................................................................................................................................... 35 13.2.1 Into the local computer zone............................................................................................................. 35 13.2.2 Into the local intranet
zone................................................................................................................ 36 13.2.3 Into the trusted sites zone ................................................................................................................ 36 13.3 External links................................................................................................................................................... 36 14 CyberPatriot 37 14.1 History................................................................................................................................................................ 37 14.2 Goals and objectives......................................................................................................................................... 37 14.3 Organization and preparation......................................................................................................................... 37 14.4 How the competition works............................................................................................................................. 37 14.5 National Finals Competition............................................................................................................................. 38 14.6 See also............................................................................................................................................................ 38 14.7
References......................................................................................................................................................... 39 14.8 External links................................................................................................................................................... 39 15 Directory traversal attack 15.1 Example 40 ......................................................................................................................................................... 15.2 Variations of directory traversal 40 ................................................................................................................... 40 15.2.1 Directory traversal on Unix................................................................................................................ 40 15.2.2 Directory traversal on Microsoft Windows...................................................................................... 40 15.2.3 URI encoded directory traversal ...................................................................................................... 41 15.2.4 Unicode / UTF-8 encoded directory traversal ................................................................................ 41 ............................................................................................................. 41 15.3 Possible methods to prevent directory traversal............................................................................................. 41 15.4 See
also............................................................................................................................................................. 41 15.5 References ...................................................................................................................................................... 42 !5.6 Resources........................................................................................................................................................ 42 15.7 External links.................................................................................................................................................. 42 15.2.5 Zip/archive traversal attacks
CONTENTS v 16 DNS rebinding 43 16.1 How DNS rebinding works............................................................................................................................. 43 16.2 Protection......................................................................................................................................................... 43 16.3 See Also............................................................................................................................................................ 43 16.4 References......................................................................................................................................................... 44 16.5 External links................................................................................................................................................... 44 17 Double encoding 45 17.1 External links................................................................................................................................................... 18 Evil twin (wireless networks) 45 46 18.1 Method............................................................................................................................................................ 46 18.2 See also............................................................................................................................................................ 46 18.3
References......................................................................................................................................................... 46 18.4 External links.................................................................................................................................................. 46 19 Fakesysdef (malware) 48 19.1 Operation......................................................................................................................................................... 48 19.1.1 Initial Infection................................................................................................................................... 48 19.2 Symptoms......................................................................................................................................................... 49 19.3 Removal and Detection................................................................................................................................... 49 19.4 References 49 ...................................................................................................................................................... 20 File inclusion vulnerability 50 20.1 Types of inclusion............................................................................................................................................ 20.1.1 Remote File Inclusion 50 ...................................................................................................................... 50
......................................................................................................................... 50 20.2 Programming languages................................................................................................................................... 50 20.2.1 PHP...................................................................................................................................................... 50 20.3 See also............................................................................................................................................................ 51 20.4 References......................................................................................................................................................... 51 20.5 External links................................................................................................................................................... 51 20.1.2 Local File Inclusion 21 Form graibi ng 52 21.1 History................................................................................................................................................................ 52 21.2 Known Occurrences........................................................................................................................................ 52 21.3 Countermeasures ............................................................................................................................................ 52 21.4 See
also............................................................................................................................................................ 52 21.5 References......................................................................................................................................................... 53 22 FREAK 54
vi CONTENTS 22.1 Vulnerability...................................................................................................................................................... 54 22.2 See also............................................................................................................................................................ 54 22.3 References ...................................................................................................................................................... 55 22.4 External links................................................................................................................................................... 55 23 GhOst RAT 56 23.1 See also............................................................................................................................................................ 56 23.2 References ...................................................................................................................................................... 56 23.3 External links................................................................................................................................................... 56 24 HTTP cookie 57 24.1 Background...................................................................................................................................................... 57 24.1.1 Origin of the name............................................................................................................................ 57 24.1.2
History................................................................................................................................................ 57 24.2 Terminology...................................................................................................................................................... 58 24.2.1 Session cookie ................................................................................................................................... 58 24.2.2 Persistent cookie................................................................................................................................ 58 24.2.3 Secure cookie...................................................................................................................................... 58 24.2.4 HttpOnly cookie ................................................................................................................................ 58 24.2.5 Third-party cookie............................................................................................................................. 58 24.2.6 Supercookie......................................................................................................................................... 59 24.2.7 Zombie cookie................................................................................................................................... 59 24.3 Structure............................................................................................................................................................ 59 24.4
Uses................................................................................................................................................................... 59 24.4.1 Session management......................................................................................................................... 59 24.4.2 Personalization................................................................................................................................... 59 24.4.3 Tracking ............................................................................................................................................ 60 24.5 Implementation................................................................................................................................................ 60 24.5.1 Setting a cookie................................................................................................................................... 60 24.5.2 Cookie attributes................................................................................................................................ 61 24.6 Browsersettings................................................................................................................................................ 62 24.7 Privacy and third-party cookies...................................................................................................................... 62 24.7.1 EU cookie directive............................................................................................................................ 63
24.8 Cookie theft and session hijacking................................................................................................................... 63 24.8.1 Network eavesdropping...................................................................................................................... 64 24.8.2 Publishing false sub-domain - DNS cache poisoning...................................................................... 64 24.8.3 Cross-site scripting - cookie theft ................................................................................................... 64 24.8.4 Cross-site scripting - proxy request................................................................................................... 65 24.8.5 Cross-site request forgery................................................................................................................... 65
CONTENTS vii 24.9 Drawbacks of cookies...................................................................................................................................... 65 24.9.1 Inaccurate identification...................................................................................................................... 65 24.9.2 Inconsistent state on client and server................................................................................................ 65 24.9.3 Inconsistent support by devices......................................................................................................... 65 24.lOAlternatives to cookies ................................................................................................................................... 66 24.10.1 IP address............................................................................................................................................ 66 24.10.2 URL (query string)............................................................................................................................. 66 24.10.3 Hidden form fields ............................................................................................................................ 66 24.10.4 window.name...................................................................................................................................... 66 24.10.5 HTTP authentication......................................................................................................................... 67 24.10.6 Identifier for
advertisers...................................................................................................................... 67 24.10.7 ETag ................................................................................................................................................... 67 24.10.8 Web storage......................................................................................................................................... 67 24.10.9 Cache................................................................................................................................................... 67 24.10. KBrowser fingerprint............................................................................................................................ 67 24.11 See also............................................................................................................................................................ 68 24.12References......................................................................................................................................................... 68 24.13 External links................................................................................................................................................... 69 25 HTTP header injection 71 25.1 Sources............................................................................................................................................................ 71 25.2 Tools
................................................................................................................................................................ 71 25.3 References......................................................................................................................................................... 71 26 HTTP Pubiic Key Pinning 72 26.1 Reporting......................................................................................................................................................... 72 26.2 Browser support................................................................................................................................................ 72 26.3 See also............................................................................................................................................................ 72 26.4 References ...................................................................................................................................................... 72 26.5 External links................................................................................................................................................... 73 27 HTTP фѕропѕе splitting 74 27.1 Prevention......................................................................................................................................................... 74 27.2 References ...................................................................................................................................................... 74 27.3
External links................................................................................................................................................... 74 28 HTTP Strict Transport Security 28.1 Specification history 75 ...................................................................................................................................... 75 28.2 HSTS mechanism overview............................................................................................................................. 75 28.3 Applicability 75 ...................................................................................................................................................
CONTENTS viii 28.4 Limitations ...................................................................................................................................................... 76 28.5 Privacy issues................................................................................................................................................... 76 28.6 Browser support................................................................................................................................................ 76 28.7 Deployment best practices ............................................................................................................................. 77 28.8 See also............................................................................................................................................................ 77 28.9 References ...................................................................................................................................................... 77 28. lOExternal links................................................................................................................................................... 78 29 IDN homograph attack 79 29.1 History............................................................................................................................................................... 79 29.2 Homographs in ASCII 79 ................................................................................................................................... 29.3 Homographs in internationalized
domain names ......................................................................................... 80 29.3.1 Cyrillic................................................................................................................................................ 80 29.3.2 Greek................................................................................................................................................... 81 29.3.3 Armenian............................................................................................................................................ 81 29.3.4 Hebrew................................................................................................................................................ 81 29.3.5 Chinese................................................................................................................................................ 81 29.3.6 Other scripts ...................................................................................................................................... 81 29.3.7 Accented characters............................................................................................................................. 81 29.3.8 Non-displayable characters................................................................................................................ 81 29.4 Defending against the attack............................................................................................................................. 82 29.5 See
also............................................................................................................................................................ 82 29.6 References......................................................................................................................................................... 82 29.7 External links................................................................................................................................................... 83 30 Internet security 84 30.1 Threats. . .......................................................................................................................................................... 84 30.1.1 Malicious software............................................................................................................................. 84 30.1.2 Denial-of-service attacks................................................................................................................... 84 30.1.3 Phishing................................................................................................................................................ 85 30.1.4 Application vulnerabilities ................................................................................................................ 85 30.2 Remedies......................................................................................................................................................... 85 30.2.1 Network layer
security..................................................................................................................... 30.2.2 Internet Protocol Security (IPsec) 85 ................................................................................................... 85 30.2.3 Security token...................................................................................................................................... 85 30.2.4 Electronic mail security...................................................................................................................... 85 30.2.5 Firewalls ............................................................................................................................................. 86 30.2.6 Browser choice................................................................................................................................... 87 30.3 Internet security products................................................................................................................................ 87
ix CONTENTS 30.3.1 Antivirus............................................................................................................................................ 87 30.3.2 Password managers............................................................................................................................. 87 30.3.3 Security suites...................................................................................................................................... 87 30.4 See also............................................................................................................................................................ 87 30.5 References......................................................................................................................................................... 87 30.6 External links................................................................................................................................................... 88 31 Logjam (computer security) 89 31.1 Responses......................................................................................................................................................... 89 31.2 See also............................................................................................................................................................ 89 31.3 References ...................................................................................................................................................... 90 31.4 External
links................................................................................................................................................... 90 32 Man-in-the-browser 91 32.1 Description...................................................................................................................................................... 91 32.2 Examples......................................................................................................................................................... 91 32.3 Protection......................................................................................................................................................... 91 32.3.1 Antivirus............................................................................................................................................. 91 32.3.2 Hardened software............................................................................................................ 91 32.3.3 Out-of-band transaction verification ................................................................................................ 92 32.3.4 Web fraud detection............................................................................................................................. 92 32.4 Related attacks ................................................................................................................................................ 92 32.4.1 Proxy
trojans...................................................................................................................................... 92 32.4.2 Man-in-the-middle............................................................................................................................. 92 32.4.3 Boy-in-the-Browser............................................................................................................................. 92 32.4.4 Clickjacking......................................................................................................................................... 92 32.5 See also............................................................................................................................................................ 92 32.6 References......................................................................................................................................................... 93 32.7 External links................................................................................................................................................... 94 33 Mass assignment vulnerability 95 33.1 References......................................................................................................................................................... 34 Metalįloit Project 95 96 34.1 History................................................................................................................................................................ 96 34.2 Metasploit
Framework...................................................................................................................................... 96 34.3 Metasploit interfaces......................................................................................................................................... 97 34.3.1 Metasploit Framework Edition.......................................................................................................... 97 34.3.2 Metasploit Community Edition.......................................................................................................... 97 34.3.3 Metasploit Express............................................................................................................................. 97
CONTENTS x 34.3.4 Metasploit Pro ................................................................................................................................... 97 34.3.5 Armitage............................................................................................................................................ 97 34.3.6 Cobalt Strike...................................................................................................................................... 97 34.4 Payloads............................................................................................................................................................ 97 34.5 Contributors...................................................................................................................................................... 97 34.6 See also............................................................................................................................................................ 97 34.7 References......................................................................................................................................................... 98 34.8 Further reading................................................................................................................................................ 98 34.9 External links................................................................................................................................................... 98 35 Nikto Web Scanner 99 35.1
Functions......................................................................................................................................................... 99 35.2 Variations......................................................................................................................................................... 99 35.3 Demo............................................................................................................................................................... 99 35.4 References ..........................................................................................................................................................100 35.5 External links.......................................................................................................................................................100 36 OWASP 101 36.1 History................................................................................................................................................................... 101 36.2 Publications and resources................................................................................................................................... 101 36.3 Awards ................................................................................................................................................................ 102 36.4 See also................................................................................................................................................................ 102 36.5
References.............................................................................................................................................................102 36.6 External links.......................................................................................................................................................102 37 OWASP ZAP 103 37.1 Features................................................................................................................................................................ 103 37.2 Awards ................................................................................................................................................................ 103 37.3 See also................................................................................................................................................................ 103 37.4 References.............................................................................................................................................................103 37.5 External links.......................................................................................................................................................104 38 Patched (malware) 38.1 Operation...................... 105 105 38.1.1 Initial Infection.......................................................................................................................................105 38.2
Symptoms............................................................................................................................................................. 105 38.3 Removal And Detection ....................................................................................................................................105 38.4 Prevention.............................................................................................................................................................106 38.5 References.............................................................................................................................................................106
CONTENTS xi 39 PLA Unit 61398 107 39.1 History................................................................................................................................................................... 107 39.2 Public position of the Chinese government.......................................................................................................107 39.3 See also................................................................................................................................................................ 108 39.4 References ..........................................................................................................................................................108 40 POODLE 109 40.1 Exploitation of graceful degradation ................................................................................................................ 109 40.2 Prevention.............................................................................................................................................................109 40.3 POODLE attack against TLS............................................................................................................................. 110 40.4 See also................................................................................................................................................................ 110 40.5 References ..........................................................................................................................................................110 40.6 External
links.......................................................................................................................................................Ill 41 Referer spoofing 41.1 Overview 112 .............................................................................................................................................................112 41.2 Application..........................................................................................................................................................112 41.3 Tools...................................................................................................................................................................... 112 41.4 See also................................................................................................................................................................ 112 41.5 Notes ................................................................................................................................................................... 113 42 Reflected DOM Injection 114 43 Self-XSS 116 43.1 Overview .............................................................................................................................................................116 43.2 History and mitigation .......................................................................................................................................116 43.3 Etymology
..........................................................................................................................................................116 43.4 References ..........................................................................................................................................................116 43.5 Further reading................................................................................................................................................... 117 44 Session fixation 44.1 Attack scenarios 118 ................................................................................................................................................ 118 44.1*1 A simple attack scenario.......................................................................................................................118 44.1.2 Attack using server generated SID....................................................................................................... 118 44.1.3 Attacks using cross-subdomain cookie................................................................................................ 118 44.2 Countermeasures ................................................................................................................................................ 119 44.2.1 Do not accept session identifiers from GET / POST variables.......................................................... 119 44.2.2 Regenerate SID on each request .......................................................................................................... 120 44.2.3
Accept only server-generated SIDs....................................................................................................... 120 44.2.4 Logout function ....................................................................................................................................120
CONTENTS xii 44.2.5 Time-out old SIDs ................................................................................................................................ 120 44.2.6 Destroy session if Referrer is suspicious ............................................................................................. 120 44.2.7 Verify that additional information is consistentthroughout session......................................................121 44.3 Defense in depth ................................................................................................................................................ 122 44.4 See also................................................................................................................................................................122 44.5 References.............................................................................................................................................................122 44.6 External links.......................................................................................................................................................122 45 Session hijacking 123 45.1 History of theHTTP ...........................................................................................................................................123 45.2 Methods................................................................................................................................................................ 123 45.3
Exploits................................................................................................................................................................ 124 45.3.1 Firesheep................................................................................................................................................ 124 45.3.2 WhatsApp sniffer................................................................................................................................... 124 45.3.3 DroidSheep............................................................................................................................................. 124 45.3.4 CookieCadger..........................................................................................................................................124 45.4 Prevention.............................................................................................................................................................124 45.5 See also................................................................................................................................................................ 125 45.6 References.............................................................................................................................................................125 45.7 External links.......................................................................................................................................................125 46 Session poisoning 126 46.1
Origins................................................................................................................................................................... 126 46.2 Attack examples................................................................................................................................................... 126 46.2.1 Trivial attack scenario............................................................................................................................. 126 46.2.2 Exploiting ambiguous or dual use of same session variable.................................................................126 46.2.3 Exploiting scripts allowing writes to arbitrarysession variables........................................................... 127 46.2.4 Exploit utilizing a shared PHP server (e.g. shared web hosting)....................................................... 127 46.3 See also................................................................................................................................................................ 127 46.4 References.............................................................................................................................................................127 47 Snarling 47.1 Example 128 .............................................................................................................................................................128 47.2 See
also................................................................................................................................................................ 128 47.3 External links.......................................................................................................................................................128 47.4 References 48 Social jacking ..................................................................................................................................................... 128 129 48.1 Technique............................................................................................................................................................. 129 48.2 Examples.............................................................................................................................................................129
xiii CONTENTS 48.3 Prevention............................................................................................................................................................. 129 48.4 Implementation................................................................................................................................................... 129 48.5 See also................................................................................................................................................................ 129 48.6 References ..........................................................................................................................................................129 49 Spoofed URL 130 49.1 Cyber Security.......................................................................................................................................................130 49.2 Detection.............................................................................................................................................................130 49.3 Prevention............................................................................................................................................................. 131 49.3.1 Susceptible Targets................................................................................................................................ 131 49.4 Common Crimes ................................................................................................................................................ 131 49.5
Phishing................................................................................................................................................................ 132 49.6 See also................................................................................................................................................................ 132 49.7 References.............................................................................................................................................................132 49.8 External links.......................................................................................................................................................132 50 Trojan horse (computing) 133 50.1 Purpose and uses 133 ..................................................................................................................... 50.1.1 Destructive............................................................................................................................................. 133 50.1.2 Use of resources or identity....................................................................................................................133 50.1.3 Money theft, ransom............................................................................................................................. 133 50.1.4 Data theft................................................................................................................................................ 133 50.1.5 Spying, surveilance or
stalking............................................................................................................. 133 50.2 Notable examples................................................................................................................................................ 134 50.2.1 Private and governmental.......................................................................................................................134 50.2.2 Publicly available....................................................................................................................................134 50.2.3 Detected by security researchers.......................................................................................................... 134 50.3 See also................................................................................................................................................................ 134 50.4 References............................................................................................................................................................. 135 50.5 External links.......................................................................................................................................................135 51 Vulnerability (computing) 136 51.1 Definitions............................................................................................................................................................. 136 51.2 Vulnerability and risk factor
models....................................................................................................................137 51.3 Information security management system.......................................................................................................... 138 51.4 Classification .......................................................................................................................................................138 51.5 Causes....................................................................................................................................................................138 51.6 Vulnerability consequences................................................................................................................................ 139 51.7 Vulnerability disclosure.......................................................................................................................................139
xiv CONTENTS 51.7.1 Vulnerability inventory..........................................................................................................................140 51.8 Vulnerability disclosure date................................................................................................................................ 140 51.9 Identifying and removing vulnerabilities............................................................................................................. 140 51.10Examples of vulnerabilities................................................................................................................................ 140 51.10.1 Software vulnerabilities..........................................................................................................................140 51.1 lSee also................................................................................................................................................................ 141 51.12References.............................................................................................................................................................141 51.13 External links.......................................................................................................................................................142 52 w3af 143 52.1 Architecture..........................................................................................................................................................143 52.2
History................................................................................................................................................................... 143 52.3 See also................................................................................................................................................................ 143 52.4 References.............................................................................................................................................................143 52.5 External links.......................................................................................................................................................143 53 Web threat 144 53.1 Delivery methods................................................................................................................................................ 144 53.2 Growth of web threats..........................................................................................................................................144 53.3 Examples............................................................................................................................................................. 144 53.4 Prevention and detection.......................................................................................................................................145 53.5 See also................................................................................................................................................................ 145 53.6
References.............................................................................................................................................................145 54 XML external entity attack 146 54.1 See also................................................................................................................................................................ 146 54.2 References............................................................................................................................................................. 146 55 XSSworm 147 55.1 Concept................................................................................................................................................................ 147 55.2 Examples............................................................................................................................................................. 147 55.2.1 Samy worm............................................................................................................................................. 147 55.2.2 Justin.tv worm .......................................................................................................................................147 55.2.3 Orkut “BomSabado” worm ............................................................................................................. 148 55.3 References............................................................................................................................................................. 148 55.4 See
also................................................................................................................................................................ 148 55.5 Text and image sources, contributors, and licenses.......................................................................................... 149 55.5.1 Text..........................................................................................................................................................149 55.5.2 Images ................................................................................................................................................... 156 55.5.3 Content license.......................................................................................................................................158
|
adam_txt |
Contents .'Ji.ttvBmiiothei į Passau 1 2 3 4 BREACH (security exploit) 1 1.1 Details. 1 1.2 Mitigation. 1 1.3 References . 1 1.4 External links. 1 Browser exploit 2 2.1 Symptoms. 2 2.2 Prevention. 2 2.3 Notable browser exploits . 2 2.4 See also. 2 2.5 External
links. 2 Browser security 3 3.1 Security. 3 3.1.1 . 4 3.2 Password security model. 4 3.3 Privacy. 4 3.3.1 . 4 3.4 Hardware browser. 4 3.5 Browser hardening. 5 3.6 See also. 5 3.7
References. 5 Plugins and extensions Flash Clickjacking 7 4.1 Description. 7 4.2 Examples. 7 4.2.1 Likejacking. 8 4.2.2 Cursorjacking. 8 4.2.3 Password manager attack. 8 і
CONTENTS ii 4.3 5 6 7 8 Prevention. 8 4.3.1 Client-side . 8 4.3.2 Server-side. 9 4.4 See also. 9 4.5 References. 9 4.6 External links. 10 Content Security Policy 11 5.1 Status. 11 5.2 Mode of operation. 12 5.2.1 Notes. 12 5.3
Reporting. 12 5.4 Browser add-ons and extensions exemption. 12 5.5 See also. 13 5.6 References. 13 5.7 External links. 14 Content sniffing 15 6.1 Charset sniffing. 15 6.2 References . 15 6.3 External links. 16 Cookie stuffing 17 7.1 Process . 17 7.2 User-generated
content. 17 7.3 Techniques . 17 7.3.1 Pop-ups. 17 7.3.2 Frames and Iframes. 18 7.3.3 Images . 18 7.3.4 JavaScript. 18 7.3.5 Stylesheets . 18 7.3.6 Flash . 18 7.4 See also. 18 7.5
References. 18 Cookiemonster attack 19 8.1 Notes. 19 8.2 References. 19 9 Cross-site cooking 20
iii CONTENTS 9.1 Origins . 9.2 References . 20 9.3 External links. 20 10 Cross-site request forgery 20 21 10.1 History. 21 10.2 Example and characteristics. 21 10.3 Forging login requests. 22 10.4 HTTP verbs and CSRF. 22 10.5 Other approaches to CSRF. 23 10.6 Effects. 23 10.7 Limitations
. 23 10.8 Prevention. 23 10.8.1 Synchronizer token pattern. 23 10.8.2 Cookie-to-Header Token. 24 10.8.3 Client side safeguards. 24 10.8.4 Other techniques. 24 10.9 See also. 25 lO.lOReferences. 25 10.11 External links. 26 10.11.1 Examples and implementations. 26
10.11.2 Blogs and articles. 26 11 Cross-site scripting 27 11.1 Background. 27 11.2 Types. 27 11.2.1 Reflected (non-persistent). 27 11.2.2 Persistent. 28 11.2.3 Server-side versus DOM-based vulnerabilities. 28 11.3 Exploit examples . 11.3.1 Non-persistent 29 . 29 11.3 Persistent attack. 30 11.4 Preventive
measures. 30 11.4.1 Contextual output encoding/escaping of string input. 30 11.4.2 Safely validating untrusted HTML input. 30 11.4.3 Cookie security. 30 11.4.4 Disabling scripts . 30 11.4.5 Emerging defensive technologies. 31 11.5 Scanning service . 31
CONTENTS IV 11.6 Related vulnerabilities. 31 11.7 See also. 32 11.8 References. 32 11.9 Further reading. 33 11.10External links. 33 12 Cross-site tracing 34 12.1 External links. 13 Cross-zone scripting 34 35 13.1 Origins of the zone concept. 35 13.2 Examples. 35 13.2.1 Into the local computer zone. 35 13.2.2 Into the local intranet
zone. 36 13.2.3 Into the trusted sites zone . 36 13.3 External links. 36 14 CyberPatriot 37 14.1 History. 37 14.2 Goals and objectives. 37 14.3 Organization and preparation. 37 14.4 How the competition works. 37 14.5 National Finals Competition. 38 14.6 See also. 38 14.7
References. 39 14.8 External links. 39 15 Directory traversal attack 15.1 Example 40 . 15.2 Variations of directory traversal 40 . 40 15.2.1 Directory traversal on Unix. 40 15.2.2 Directory traversal on Microsoft Windows. 40 15.2.3 URI encoded directory traversal . 41 15.2.4 Unicode / UTF-8 encoded directory traversal . 41 . 41 15.3 Possible methods to prevent directory traversal. 41 15.4 See
also. 41 15.5 References . 42 !5.6 Resources. 42 15.7 External links. 42 15.2.5 Zip/archive traversal attacks
CONTENTS v 16 DNS rebinding 43 16.1 How DNS rebinding works. 43 16.2 Protection. 43 16.3 See Also. 43 16.4 References. 44 16.5 External links. 44 17 Double encoding 45 17.1 External links. 18 Evil twin (wireless networks) 45 46 18.1 Method. 46 18.2 See also. 46 18.3
References. 46 18.4 External links. 46 19 Fakesysdef (malware) 48 19.1 Operation. 48 19.1.1 Initial Infection. 48 19.2 Symptoms. 49 19.3 Removal and Detection. 49 19.4 References 49 . 20 File inclusion vulnerability 50 20.1 Types of inclusion. 20.1.1 Remote File Inclusion 50 . 50
. 50 20.2 Programming languages. 50 20.2.1 PHP. 50 20.3 See also. 51 20.4 References. 51 20.5 External links. 51 20.1.2 Local File Inclusion 21 Form graibi ng 52 21.1 History. 52 21.2 Known Occurrences. 52 21.3 Countermeasures . 52 21.4 See
also. 52 21.5 References. 53 22 FREAK 54
vi CONTENTS 22.1 Vulnerability. 54 22.2 See also. 54 22.3 References . 55 22.4 External links. 55 23 GhOst RAT 56 23.1 See also. 56 23.2 References . 56 23.3 External links. 56 24 HTTP cookie 57 24.1 Background. 57 24.1.1 Origin of the name. 57 24.1.2
History. 57 24.2 Terminology. 58 24.2.1 Session cookie . 58 24.2.2 Persistent cookie. 58 24.2.3 Secure cookie. 58 24.2.4 HttpOnly cookie . 58 24.2.5 Third-party cookie. 58 24.2.6 Supercookie. 59 24.2.7 Zombie cookie. 59 24.3 Structure. 59 24.4
Uses. 59 24.4.1 Session management. 59 24.4.2 Personalization. 59 24.4.3 Tracking . 60 24.5 Implementation. 60 24.5.1 Setting a cookie. 60 24.5.2 Cookie attributes. 61 24.6 Browsersettings. 62 24.7 Privacy and third-party cookies. 62 24.7.1 EU cookie directive. 63
24.8 Cookie theft and session hijacking. 63 24.8.1 Network eavesdropping. 64 24.8.2 Publishing false sub-domain - DNS cache poisoning. 64 24.8.3 Cross-site scripting - cookie theft . 64 24.8.4 Cross-site scripting - proxy request. 65 24.8.5 Cross-site request forgery. 65
CONTENTS vii 24.9 Drawbacks of cookies. 65 24.9.1 Inaccurate identification. 65 24.9.2 Inconsistent state on client and server. 65 24.9.3 Inconsistent support by devices. 65 24.lOAlternatives to cookies . 66 24.10.1 IP address. 66 24.10.2 URL (query string). 66 24.10.3 Hidden form fields . 66 24.10.4 window.name. 66 24.10.5 HTTP authentication. 67 24.10.6 Identifier for
advertisers. 67 24.10.7 ETag . 67 24.10.8 Web storage. 67 24.10.9 Cache. 67 24.10. KBrowser fingerprint. 67 24.11 See also. 68 24.12References. 68 24.13 External links. 69 25 HTTP header injection 71 25.1 Sources. 71 25.2 Tools
. 71 25.3 References. 71 26 HTTP Pubiic Key Pinning 72 26.1 Reporting. 72 26.2 Browser support. 72 26.3 See also. 72 26.4 References . 72 26.5 External links. 73 27 HTTP фѕропѕе splitting 74 27.1 Prevention. 74 27.2 References . 74 27.3
External links. 74 28 HTTP Strict Transport Security 28.1 Specification history 75 . 75 28.2 HSTS mechanism overview. 75 28.3 Applicability 75 .
CONTENTS viii 28.4 Limitations . 76 28.5 Privacy issues. 76 28.6 Browser support. 76 28.7 Deployment best practices . 77 28.8 See also. 77 28.9 References . 77 28. lOExternal links. 78 29 IDN homograph attack 79 29.1 History. 79 29.2 Homographs in ASCII 79 . 29.3 Homographs in internationalized
domain names . 80 29.3.1 Cyrillic. 80 29.3.2 Greek. 81 29.3.3 Armenian. 81 29.3.4 Hebrew. 81 29.3.5 Chinese. 81 29.3.6 Other scripts . 81 29.3.7 Accented characters. 81 29.3.8 Non-displayable characters. 81 29.4 Defending against the attack. 82 29.5 See
also. 82 29.6 References. 82 29.7 External links. 83 30 Internet security 84 30.1 Threats. . . 84 30.1.1 Malicious software. 84 30.1.2 Denial-of-service attacks. 84 30.1.3 Phishing. 85 30.1.4 Application vulnerabilities . 85 30.2 Remedies. 85 30.2.1 Network layer
security. 30.2.2 Internet Protocol Security (IPsec) 85 . 85 30.2.3 Security token. 85 30.2.4 Electronic mail security. 85 30.2.5 Firewalls . 86 30.2.6 Browser choice. 87 30.3 Internet security products. 87
ix CONTENTS 30.3.1 Antivirus. 87 30.3.2 Password managers. 87 30.3.3 Security suites. 87 30.4 See also. 87 30.5 References. 87 30.6 External links. 88 31 Logjam (computer security) 89 31.1 Responses. 89 31.2 See also. 89 31.3 References . 90 31.4 External
links. 90 32 Man-in-the-browser 91 32.1 Description. 91 32.2 Examples. 91 32.3 Protection. 91 32.3.1 Antivirus. 91 32.3.2 Hardened software. 91 32.3.3 Out-of-band transaction verification . 92 32.3.4 Web fraud detection. 92 32.4 Related attacks . 92 32.4.1 Proxy
trojans. 92 32.4.2 Man-in-the-middle. 92 32.4.3 Boy-in-the-Browser. 92 32.4.4 Clickjacking. 92 32.5 See also. 92 32.6 References. 93 32.7 External links. 94 33 Mass assignment vulnerability 95 33.1 References. 34 Metalįloit Project 95 96 34.1 History. 96 34.2 Metasploit
Framework. 96 34.3 Metasploit interfaces. 97 34.3.1 Metasploit Framework Edition. 97 34.3.2 Metasploit Community Edition. 97 34.3.3 Metasploit Express. 97
CONTENTS x 34.3.4 Metasploit Pro . 97 34.3.5 Armitage. 97 34.3.6 Cobalt Strike. 97 34.4 Payloads. 97 34.5 Contributors. 97 34.6 See also. 97 34.7 References. 98 34.8 Further reading. 98 34.9 External links. 98 35 Nikto Web Scanner 99 35.1
Functions. 99 35.2 Variations. 99 35.3 Demo. 99 35.4 References .100 35.5 External links.100 36 OWASP 101 36.1 History. 101 36.2 Publications and resources. 101 36.3 Awards . 102 36.4 See also. 102 36.5
References.102 36.6 External links.102 37 OWASP ZAP 103 37.1 Features. 103 37.2 Awards . 103 37.3 See also. 103 37.4 References.103 37.5 External links.104 38 Patched (malware) 38.1 Operation. 105 105 38.1.1 Initial Infection.105 38.2
Symptoms. 105 38.3 Removal And Detection .105 38.4 Prevention.106 38.5 References.106
CONTENTS xi 39 PLA Unit 61398 107 39.1 History. 107 39.2 Public position of the Chinese government.107 39.3 See also. 108 39.4 References .108 40 POODLE 109 40.1 Exploitation of graceful degradation . 109 40.2 Prevention.109 40.3 POODLE attack against TLS. 110 40.4 See also. 110 40.5 References .110 40.6 External
links.Ill 41 Referer spoofing 41.1 Overview 112 .112 41.2 Application.112 41.3 Tools. 112 41.4 See also. 112 41.5 Notes . 113 42 Reflected DOM Injection 114 43 Self-XSS 116 43.1 Overview .116 43.2 History and mitigation .116 43.3 Etymology
.116 43.4 References .116 43.5 Further reading. 117 44 Session fixation 44.1 Attack scenarios 118 . 118 44.1*1 A simple attack scenario.118 44.1.2 Attack using server generated SID. 118 44.1.3 Attacks using cross-subdomain cookie. 118 44.2 Countermeasures . 119 44.2.1 Do not accept session identifiers from GET / POST variables. 119 44.2.2 Regenerate SID on each request . 120 44.2.3
Accept only server-generated SIDs. 120 44.2.4 Logout function .120
CONTENTS xii 44.2.5 Time-out old SIDs . 120 44.2.6 Destroy session if Referrer is suspicious . 120 44.2.7 Verify that additional information is consistentthroughout session.121 44.3 Defense in depth . 122 44.4 See also.122 44.5 References.122 44.6 External links.122 45 Session hijacking 123 45.1 History of theHTTP .123 45.2 Methods. 123 45.3
Exploits. 124 45.3.1 Firesheep. 124 45.3.2 WhatsApp sniffer. 124 45.3.3 DroidSheep. 124 45.3.4 CookieCadger.124 45.4 Prevention.124 45.5 See also. 125 45.6 References.125 45.7 External links.125 46 Session poisoning 126 46.1
Origins. 126 46.2 Attack examples. 126 46.2.1 Trivial attack scenario. 126 46.2.2 Exploiting ambiguous or dual use of same session variable.126 46.2.3 Exploiting scripts allowing writes to arbitrarysession variables. 127 46.2.4 Exploit utilizing a shared PHP server (e.g. shared web hosting). 127 46.3 See also. 127 46.4 References.127 47 Snarling 47.1 Example 128 .128 47.2 See
also. 128 47.3 External links.128 47.4 References 48 Social jacking . 128 129 48.1 Technique. 129 48.2 Examples.129
xiii CONTENTS 48.3 Prevention. 129 48.4 Implementation. 129 48.5 See also. 129 48.6 References .129 49 Spoofed URL 130 49.1 Cyber Security.130 49.2 Detection.130 49.3 Prevention. 131 49.3.1 Susceptible Targets. 131 49.4 Common Crimes . 131 49.5
Phishing. 132 49.6 See also. 132 49.7 References.132 49.8 External links.132 50 Trojan horse (computing) 133 50.1 Purpose and uses 133 . 50.1.1 Destructive. 133 50.1.2 Use of resources or identity.133 50.1.3 Money theft, ransom. 133 50.1.4 Data theft. 133 50.1.5 Spying, surveilance or
stalking. 133 50.2 Notable examples. 134 50.2.1 Private and governmental.134 50.2.2 Publicly available.134 50.2.3 Detected by security researchers. 134 50.3 See also. 134 50.4 References. 135 50.5 External links.135 51 Vulnerability (computing) 136 51.1 Definitions. 136 51.2 Vulnerability and risk factor
models.137 51.3 Information security management system. 138 51.4 Classification .138 51.5 Causes.138 51.6 Vulnerability consequences. 139 51.7 Vulnerability disclosure.139
xiv CONTENTS 51.7.1 Vulnerability inventory.140 51.8 Vulnerability disclosure date. 140 51.9 Identifying and removing vulnerabilities. 140 51.10Examples of vulnerabilities. 140 51.10.1 Software vulnerabilities.140 51.1 lSee also. 141 51.12References.141 51.13 External links.142 52 w3af 143 52.1 Architecture.143 52.2
History. 143 52.3 See also. 143 52.4 References.143 52.5 External links.143 53 Web threat 144 53.1 Delivery methods. 144 53.2 Growth of web threats.144 53.3 Examples. 144 53.4 Prevention and detection.145 53.5 See also. 145 53.6
References.145 54 XML external entity attack 146 54.1 See also. 146 54.2 References. 146 55 XSSworm 147 55.1 Concept. 147 55.2 Examples. 147 55.2.1 Samy worm. 147 55.2.2 Justin.tv worm .147 55.2.3 Orkut “BomSabado” worm . 148 55.3 References. 148 55.4 See
also. 148 55.5 Text and image sources, contributors, and licenses. 149 55.5.1 Text.149 55.5.2 Images . 156 55.5.3 Content license.158 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kaswell, William |
author_facet | Kaswell, William |
author_role | aut |
author_sort | Kaswell, William |
author_variant | w k wk |
building | Verbundindex |
bvnumber | BV047019283 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1225884430 (DE-599)BVBBV047019283 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01183nam a2200313 c 4500</leader><controlfield tag="001">BV047019283</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201202 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">201119s2016 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781532859496</subfield><subfield code="9">978-1-5328-5949-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1225884430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047019283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kaswell, William</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Encyclopedia of web security exploits</subfield><subfield code="c">William Kaswell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Scotts Valley]</subfield><subfield code="b">[Createspace]</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">158 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032426773&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032426773</subfield></datafield></record></collection> |
id | DE-604.BV047019283 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:58:55Z |
indexdate | 2024-07-10T09:00:18Z |
institution | BVB |
isbn | 9781532859496 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032426773 |
oclc_num | 1225884430 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 158 Seiten |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | [Createspace] |
record_format | marc |
spelling | Kaswell, William Verfasser aut Encyclopedia of web security exploits William Kaswell [Scotts Valley] [Createspace] [2016] 158 Seiten txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032426773&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kaswell, William Encyclopedia of web security exploits Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Encyclopedia of web security exploits |
title_auth | Encyclopedia of web security exploits |
title_exact_search | Encyclopedia of web security exploits |
title_exact_search_txtP | Encyclopedia of web security exploits |
title_full | Encyclopedia of web security exploits William Kaswell |
title_fullStr | Encyclopedia of web security exploits William Kaswell |
title_full_unstemmed | Encyclopedia of web security exploits William Kaswell |
title_short | Encyclopedia of web security exploits |
title_sort | encyclopedia of web security exploits |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032426773&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaswellwilliam encyclopediaofwebsecurityexploits |