Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Attacking and Exploiting Modern Web Applications
#1
[Image: hpd7gdafd165.png]
Attacking and Exploiting Modern Web Applications | 338 | Simone Onofri and 
Donato Onofri
 | 2023 | Packt Publishing Pvt Ltd | 1801816298

Master the art of web exploitation and bug bounty hunting with real CVEs and CTFs on SAML, WordPress, IoT, ElectronJS, and Ethereum Smart Contracts.

Purchase of the print or Kindle book includes a free PDF eBook.

Key Features
Book Description
Web Attacks and Exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the new challenges of web application security, providing an in-depth understanding of hackers' methods. It equips readers with the practical knowledge and skills needed to effectively understand these attacks, accompanying them through 3 CTFs and explaining the discovery of 7 CVEs.
The book starts by emphasizing the importance of mindset and toolset in conducting successful attacks. It helps you understand the required methodologies and frameworks, how to configure the environment using interception proxies and automate tasks with Bash and Python, and how to set up a research lab.
The book explores how to attack the authentication layer focusing on SAML, internet-facing web applications (specifically WordPress and SQL injection), exploiting vulnerabilities in IoT devices such as Command Injection. It also covers attacks on Electron JavaScript-based applications (XSS and RCE) and the security challenges of auditing and exploiting Ethereum Smart Contracts written in Solidity. The book concludes by describing how to disclose vulnerabilities. Each chapter analyses confirmed cases of exploitation mapped with MITRE ATT&CK.
By the end of this book, you will enhance your ability to find and exploit web vulnerabilities.

What you will learn
Who this book is for
We aim the audience at anyone who must ensure their organization's security. Penetration Testers and Red Teamers who want to deepen their knowledge of the current security challenges for web applications; Developers and DevOps Engineers who want to get into the mindset of an attacker; and Security Managers and CISOs to truly understand the impact and the Risk of Web, IoT, and Smart Contracts. Basic knowledge of Web Technologies and related protocols is a must.

Table of Contents
Master the art of web exploitation and bug bounty hunting with real CVEs and CTFs on SAML, WordPress, IoT, ElectronJS, and Ethereum Smart Contracts.

Key Features
Learn to discover vulnerabilities using source code, dynamic analysis, and decompiling binaries.
Find and exploit vulnerabilities like SQL Injection, XSS, Command Injection, RCE, and Reentrancy.
Analyze real security incidents based on MITRE ATT&CK to understand the risk at the CISO level.

Book Description
Web Attacks and Exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the new challenges of web application security, providing an in-depth understanding of hackers' methods. It equips readers with the practical knowledge and skills needed to effectively understand these attacks, accompanying them through 3 CTFs and explaining the discovery of 7 CVEs.

The book starts by emphasizing the importance of mindset and toolset in conducting successful attacks. It helps you understand the required methodologies and frameworks, how to configure the environment using interception proxies and automate tasks with Bash and Python, and how to set up a research lab.

The book explores how to attack the authentication layer focusing on SAML, internet-facing web applications (specifically WordPress and SQL injection), exploiting vulnerabilities in IoT devices such as Command Injection. It also covers attacks on Electron JavaScript-based applications (XSS and RCE) and the security challenges of auditing and exploiting Ethereum Smart Contracts written in Solidity. The book concludes by describing how to disclose vulnerabilities. Each chapter analyses confirmed cases of exploitation mapped with MITRE ATT&CK.
By the end of this book, you will enhance your ability to find and exploit web vulnerabilities.

What you will learn
Understand the mindset, methodologies, and toolset for Web Attacks and Exploitation.
Learn how SAML and SSO work and find their vulnerabilities
Understand WordPress and how to exploit SQL Injections
Learn how IoT Devices work and to exploit Command Injection
Understand ElectronJS Applications and transform an XSS to an RCE
Learn how to audit Solidity's Ethereum Smart Contracts
Understand how to decompile, debug, and instrument Web Applications

Who this book is for
We aim the audience at anyone who must ensure their organization's security. Penetration Testers and Red Teamers who want to deepen their knowledge of the current security challenges for web applications; Developers and DevOps Engineers who want to get into the mindset of an attacker; and Security Managers and CISOs to truly understand the impact and the Risk of Web, IoT, and Smart Contracts. Basic knowledge of Web Technologies and related protocols is a must.



Contents of Download:
Attacking and Exploiting Modern Web Applications.epub (33.71 MB)
Attacking and Exploiting Modern Web Applications.mobi (40.32 MB)


KatFile Link(s)

[To see links please register or login]

NitroFlare Link(s)

[To see links please register or login]

RapidGator Link(s)

[To see links please register or login]

[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now