Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Websites and Applications (1st Edition)

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Websites and Applications (1st Edition)
Sanjib Sinha
RRP:
NZ$ 70.99
Our Price:
NZ$ 56.79
Paperback
h235 x 155mm - 218pg
7 Dec 2019 US
International import eta 7-19 days
9781484253908
Out Of Stock
Currently no stock in-store, stock is sourced to your order
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications.What You Will LearnImplement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injectionResist strongly unintended XML attacks Who This Book Is ForWhite-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.

In stock - for items in stock we aim to dispatch the next business day. For delivery in NZ allow 2-5 business days, with rural taking a wee bit longer.

Locally sourced in NZ - stock comes from a NZ supplier with an approximate delivery of 7-15 business days.

International Imports - stock is imported into NZ, depending on air or sea shipping option from the international supplier stock can take 10-30 working days to arrive into NZ. 

Pre-order Titles - delivery will vary depending on where the title is published, if local stock is available in NZ then 5-7 business days, for international imports it can be 10-30 business days. In all cases we will access the quickest supply option.

Delivery Packaging - we ship all items in cardboard sleeves or by box with either packing paper or corn starch chips. (We avoid using plastics bubble bags)

Tracking - Orders are delivered by track and trace courier and are fully insured, tracking information will be sent by email once dispatched.

View our full Order & Delivery information