How to Break Web Software: Functional and Security Testing of Web Applications and Web Services (Paperback)
暫譯: 如何破解網路軟體:網路應用程式與網路服務的功能與安全測試 (平裝本)
Mike Andrews, James A. Whittaker
- 出版商: Addison Wesley
- 出版日期: 2006-02-02
- 售價: $2,220
- 貴賓價: 9.5 折 $2,109
- 語言: 英文
- 頁數: 240
- 裝訂: Paperback
- ISBN: 0321369440
- ISBN-13: 9780321369444
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$1,920$1,824 -
$1,350Extreme Programming Examined
-
$1,580$1,501 -
$1,215Extreme Programming for Web Projects
-
$1,520$1,444 -
$780CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
-
$299$254 -
$880$695 -
$540$427 -
$450$383 -
$780$663 -
$680$537 -
$650$507 -
$750$593 -
$880$695 -
$680$537 -
$450$356 -
$780$616 -
$720$569 -
$1,100$1,078 -
$700$630 -
$580$493 -
$299$236 -
$1,900$1,805 -
$680$537
相關主題
商品描述
Description
"The techniques in this book are not an option for testers–they are mandatory and these are the guys to tell you how to apply them!"
–HarryRobinson, Google.
Rigorously test and improve the security of all your Web software!
It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software.
In this book, two renowned experts address every category of Web software exploit: attacks on clients, servers, state, user inputs, and more. You’ll master powerful attack tools and techniques as you uncover dozens of crucial, widely exploited flaws in Web architecture and coding. The authors reveal where to look for potential threats and attack vectors, how to rigorously test for each of them, and how to mitigate the problems you find. Coverage includes
· Client vulnerabilities, including attacks on client-side validation
· State-based attacks: hidden fields, CGI parameters, cookie poisoning, URL jumping, and session hijacking
· Attacks on user-supplied inputs: cross-site scripting, SQL injection, and directory traversal
· Language- and technology-based attacks: buffer overflows, canonicalization, and NULL string attacks
· Server attacks: SQL Injection with stored procedures, command injection, and server fingerprinting
· Cryptography, privacy, and attacks on Web services
Your Web software is mission-critical–it can’t be compromised. Whether you’re a developer, tester, QA specialist, or IT manager, this book will help you protect that software–systematically.
Companion CD contains full source code for one testing tool you can modify and extend, free Web security testing tools, and complete code from a flawed Web site designed to give you hands-on practice in identifying security holes.
Table of Contents
Preface vii
Acknowledgments ix
About the Authors xi
Chapter 1: The Web Is Different 1
Chapter 2: Gathering Information on the Target 11
Chapter 3: Attacking the Client 29
Chapter 4: State-Based Attacks 41
Chapter 5: Attacking User-Supplied Input Data 65
Chapter 6: Language-Based Attacks 85
Chapter 7: Attacking the Server 99
Chapter 8: Authentication 115
Chapter 9: Privacy 135
Chapter 10: Web Services 149
Appendix A: Fifty Years of Software: Key Principles for Quality 159
Appendix B: Flowershop Bugs 171
Appendix C: Tools 179
Index 207
商品描述(中文翻譯)
描述
「本書中的技術對測試人員來說不是選擇,而是必須的,這些人會告訴你如何應用它們!」
–Harry Robinson, Google.
嚴格測試並改善您所有網頁軟體的安全性!
這就像死亡和稅收一樣確定:駭客將無情地攻擊您的網站、應用程式和服務。如果您存在漏洞,您最好在黑帽駭客之前自己發現這些攻擊。現在,有一本權威的實用指南可以幫助您進行任何基於網頁的軟體的安全測試:《如何攻破網頁軟體》。
在本書中,兩位知名專家針對每一類網頁軟體的漏洞進行探討:對客戶端、伺服器、狀態、用戶輸入等的攻擊。您將掌握強大的攻擊工具和技術,揭示網頁架構和編碼中數十個關鍵的、廣泛利用的缺陷。作者揭示了潛在威脅和攻擊向量的查找位置,如何對每一個進行嚴格測試,以及如何減輕您發現的問題。內容包括:
· 客戶端漏洞,包括對客戶端驗證的攻擊
· 基於狀態的攻擊:隱藏欄位、CGI 參數、Cookie 竄改、URL 跳轉和會話劫持
· 對用戶提供的輸入的攻擊:跨站腳本、SQL 注入和目錄遍歷
· 基於語言和技術的攻擊:緩衝區溢出、標準化和 NULL 字串攻擊
· 伺服器攻擊:使用儲存過程的 SQL 注入、命令注入和伺服器指紋識別
· 密碼學、隱私和對網頁服務的攻擊
您的網頁軟體是任務關鍵的——它不能被妥協。無論您是開發人員、測試人員、質量保證專家還是 IT 經理,本書將幫助您系統性地保護這些軟體。
隨書附贈的 CD 包含一個您可以修改和擴展的測試工具的完整源代碼、免費的網頁安全測試工具,以及一個設計用來讓您實際練習識別安全漏洞的有缺陷網站的完整代碼。
目錄
前言 vii
致謝 ix
關於作者 xi
第一章:網頁是不同的 1
第二章:收集目標資訊 11
第三章:攻擊客戶端 29
第四章:基於狀態的攻擊 41
第五章:攻擊用戶提供的輸入數據 65
第六章:基於語言的攻擊 85
第七章:攻擊伺服器 99
第八章:身份驗證 115
第九章:隱私 135
第十章:網頁服務 149
附錄 A:五十年的軟體:質量的關鍵原則 159
附錄 B:花店漏洞 171
附錄 C:工具 179
索引 207