The basics of web hacking :: tools and techniques to attack the Web /
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools su...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
Syngress, an imprint of Elsevier,
2013.
|
Schriftenreihe: | The basics
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124166592 0124166598 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn852158484 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130708s2013 ne ob 001 0 eng d | ||
010 | |a 2013017240 | ||
040 | |a N$T |b eng |e pn |c N$T |d UIU |d YDXCP |d TEFOD |d UPM |d UKDOC |d GGVRL |d OCLCQ |d OCLCA |d OCLCQ |d OCLCO |d OCLCQ |d LLB |d COO |d TEFOD |d OCLCQ |d LOA |d OCLCO |d ICA |d LVT |d AGLDB |d CNNOR |d Z5A |d PIFAG |d FVL |d LIV |d SAV |d OCLCQ |d OCLCA |d U3W |d OCLCF |d STF |d WRM |d D6H |d VTS |d LND |d VT2 |d OCLCQ |d WYU |d A6Q |d M8D |d COH |d OCLCO |d OCLCQ |d OCLCO |d UKCRE |d COM |d OCLCO |d QGK |d COA |d OCLCQ |d OCLCO |d INARC |d OCLCL |d SXB | ||
019 | |a 859181874 |a 962188528 |a 972014096 |a 991974913 |a 1037760150 |a 1038687781 |a 1055354522 |a 1065750443 |a 1081211212 |a 1083600311 |a 1103250408 |a 1129377992 |a 1153052942 |a 1259277421 |a 1340113875 |a 1412398690 | ||
020 | |a 9780124166592 |q (electronic bk.) | ||
020 | |a 0124166598 |q (electronic bk.) | ||
020 | |z 9780124166004 | ||
020 | |z 0124166008 | ||
024 | 8 | |a (WaSeSS)ssj0000915343 | |
035 | |a (OCoLC)852158484 |z (OCoLC)859181874 |z (OCoLC)962188528 |z (OCoLC)972014096 |z (OCoLC)991974913 |z (OCoLC)1037760150 |z (OCoLC)1038687781 |z (OCoLC)1055354522 |z (OCoLC)1065750443 |z (OCoLC)1081211212 |z (OCoLC)1083600311 |z (OCoLC)1103250408 |z (OCoLC)1129377992 |z (OCoLC)1153052942 |z (OCoLC)1259277421 |z (OCoLC)1340113875 |z (OCoLC)1412398690 | ||
037 | |a 550756AC-CCAB-4F38-8292-46437BC9964E |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 |b .P385 2013eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Pauli, Joshua J. |0 http://id.loc.gov/authorities/names/no2004033282 | |
245 | 1 | 4 | |a The basics of web hacking : |b tools and techniques to attack the Web / |c Josh Pauli. |
260 | |a Amsterdam : |b Syngress, an imprint of Elsevier, |c 2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 0 | |a The basics | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps. | |
520 | |a The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Web sites |x Security measures. | |
650 | 0 | |a Web applications |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Hackers. |0 http://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 6 | |a Sites Web |x Sécurité |x Mesures. | |
650 | 6 | |a Applications Web |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Web sites |x Security measures |2 fast | |
655 | 0 | |a Electronic book. | |
655 | 4 | |a Electronic books. | |
758 | |i has work: |a The basics of web hacking (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFQDVppWQCftQ3XhT3hM8C |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Pauli, Joshua J. |t Basics of web hacking. |d Amsterdam : Syngress, an imprint of Elsevier, 2013 |z 9780124166004 |w (DLC) 2013017240 |w (OCoLC)846846770 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124166004 |3 Volltext |
938 | |a 123Library |b 123L |n 102596 | ||
938 | |a EBSCOhost |b EBSC |n 573954 | ||
938 | |a Cengage Learning |b GVRL |n GVRL8CUC | ||
938 | |a YBP Library Services |b YANK |n 10803594 | ||
938 | |a Internet Archive |b INAR |n basicsofwebhacki0000paul | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn852158484 |
---|---|
_version_ | 1816882237739630592 |
adam_text | |
any_adam_object | |
author | Pauli, Joshua J. |
author_GND | http://id.loc.gov/authorities/names/no2004033282 |
author_facet | Pauli, Joshua J. |
author_role | |
author_sort | Pauli, Joshua J. |
author_variant | j j p jj jjp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .P385 2013eb |
callnumber-search | TK5105.59 .P385 2013eb |
callnumber-sort | TK 45105.59 P385 42013EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps. |
ctrlnum | (OCoLC)852158484 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04926cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn852158484</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130708s2013 ne ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2013017240</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">UIU</subfield><subfield code="d">YDXCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">UPM</subfield><subfield code="d">UKDOC</subfield><subfield code="d">GGVRL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LLB</subfield><subfield code="d">COO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ICA</subfield><subfield code="d">LVT</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">Z5A</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">LIV</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">LND</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">M8D</subfield><subfield code="d">COH</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKCRE</subfield><subfield code="d">COM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">859181874</subfield><subfield code="a">962188528</subfield><subfield code="a">972014096</subfield><subfield code="a">991974913</subfield><subfield code="a">1037760150</subfield><subfield code="a">1038687781</subfield><subfield code="a">1055354522</subfield><subfield code="a">1065750443</subfield><subfield code="a">1081211212</subfield><subfield code="a">1083600311</subfield><subfield code="a">1103250408</subfield><subfield code="a">1129377992</subfield><subfield code="a">1153052942</subfield><subfield code="a">1259277421</subfield><subfield code="a">1340113875</subfield><subfield code="a">1412398690</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166592</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166598</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780124166004</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0124166008</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000915343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852158484</subfield><subfield code="z">(OCoLC)859181874</subfield><subfield code="z">(OCoLC)962188528</subfield><subfield code="z">(OCoLC)972014096</subfield><subfield code="z">(OCoLC)991974913</subfield><subfield code="z">(OCoLC)1037760150</subfield><subfield code="z">(OCoLC)1038687781</subfield><subfield code="z">(OCoLC)1055354522</subfield><subfield code="z">(OCoLC)1065750443</subfield><subfield code="z">(OCoLC)1081211212</subfield><subfield code="z">(OCoLC)1083600311</subfield><subfield code="z">(OCoLC)1103250408</subfield><subfield code="z">(OCoLC)1129377992</subfield><subfield code="z">(OCoLC)1153052942</subfield><subfield code="z">(OCoLC)1259277421</subfield><subfield code="z">(OCoLC)1340113875</subfield><subfield code="z">(OCoLC)1412398690</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">550756AC-CCAB-4F38-8292-46437BC9964E</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.P385 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pauli, Joshua J.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004033282</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The basics of web hacking :</subfield><subfield code="b">tools and techniques to attack the Web /</subfield><subfield code="c">Josh Pauli.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">Syngress, an imprint of Elsevier,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The basics</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94005931</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Applications Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The basics of web hacking (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFQDVppWQCftQ3XhT3hM8C</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Pauli, Joshua J.</subfield><subfield code="t">Basics of web hacking.</subfield><subfield code="d">Amsterdam : Syngress, an imprint of Elsevier, 2013</subfield><subfield code="z">9780124166004</subfield><subfield code="w">(DLC) 2013017240</subfield><subfield code="w">(OCoLC)846846770</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124166004</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">102596</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">573954</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL8CUC</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10803594</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">basicsofwebhacki0000paul</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. Electronic books. |
genre_facet | Electronic book. Electronic books. |
id | ZDB-4-EBA-ocn852158484 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:25Z |
institution | BVB |
isbn | 9780124166592 0124166598 |
language | English |
lccn | 2013017240 |
oclc_num | 852158484 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress, an imprint of Elsevier, |
record_format | marc |
series2 | The basics |
spelling | Pauli, Joshua J. http://id.loc.gov/authorities/names/no2004033282 The basics of web hacking : tools and techniques to attack the Web / Josh Pauli. Amsterdam : Syngress, an imprint of Elsevier, 2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file The basics Includes bibliographical references and index. Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps. The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Print version record. English. Web sites Security measures. Web applications Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer crimes Prevention. Sites Web Sécurité Mesures. Applications Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Pirates informatiques. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Hackers fast Penetration testing (Computer security) fast Web sites Security measures fast Electronic book. Electronic books. has work: The basics of web hacking (Text) https://id.oclc.org/worldcat/entity/E39PCFQDVppWQCftQ3XhT3hM8C https://id.oclc.org/worldcat/ontology/hasWork Print version: Pauli, Joshua J. Basics of web hacking. Amsterdam : Syngress, an imprint of Elsevier, 2013 9780124166004 (DLC) 2013017240 (OCoLC)846846770 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124166004 Volltext |
spellingShingle | Pauli, Joshua J. The basics of web hacking : tools and techniques to attack the Web / Chapter 1. The basics of web hacking -- chapter 2. Web server hacking -- chapter 3. Web application recon and scanning -- chapter 4. Web application exploitation with injection -- chapter 5. Web application exploitation with broken authentication and path traversal -- chapter 6. Web user hacking -- chapter 7. Fixes -- chapter 8. Next steps. Web sites Security measures. Web applications Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer crimes Prevention. Sites Web Sécurité Mesures. Applications Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Pirates informatiques. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Hackers fast Penetration testing (Computer security) fast Web sites Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh94005931 |
title | The basics of web hacking : tools and techniques to attack the Web / |
title_auth | The basics of web hacking : tools and techniques to attack the Web / |
title_exact_search | The basics of web hacking : tools and techniques to attack the Web / |
title_full | The basics of web hacking : tools and techniques to attack the Web / Josh Pauli. |
title_fullStr | The basics of web hacking : tools and techniques to attack the Web / Josh Pauli. |
title_full_unstemmed | The basics of web hacking : tools and techniques to attack the Web / Josh Pauli. |
title_short | The basics of web hacking : |
title_sort | basics of web hacking tools and techniques to attack the web |
title_sub | tools and techniques to attack the Web / |
topic | Web sites Security measures. Web applications Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer crimes Prevention. Sites Web Sécurité Mesures. Applications Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Pirates informatiques. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Hackers fast Penetration testing (Computer security) fast Web sites Security measures fast |
topic_facet | Web sites Security measures. Web applications Security measures. Computer networks Security measures. Penetration testing (Computer security) Hackers. Computer crimes Prevention. Sites Web Sécurité Mesures. Applications Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Pirates informatiques. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer crimes Prevention Computer networks Security measures Hackers Web sites Security measures Electronic book. Electronic books. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=573954 https://www.sciencedirect.com/science/book/9780124166004 |
work_keys_str_mv | AT paulijoshuaj thebasicsofwebhackingtoolsandtechniquestoattacktheweb AT paulijoshuaj basicsofwebhackingtoolsandtechniquestoattacktheweb |