McClure, Stuart.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. - Boston : Addison-Wesley, c2003. - xxxi, 492 p. : ill. ; 24 cm.
Includes bibliographical references and index.
The E-Commerce Playground -- Web Languages: The Babylon of the 21st Century -- Web and Database Servers -- Shopping Carts and Payment Gateways -- HTTP and HTTPS: The Hacking Protocols -- URL: The Web Hacker's Sword -- URLs Unraveled -- Web: Under (the) Cover -- Reading Between the Lines -- Site Linkage Analysis -- How Do They Do It? -- Cyber Graffiti -- E-Shoplifting -- Database Access -- Java: Remote Command Execution -- Impersonation -- Buffer Overflowers: On-the-Fly -- Advanced Web Kung Fu -- Web Hacking: Automated Tools -- Worms -- Beating the IDS. Web and Database Port Listing -- HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- Remote Command Execution Cheat Sheet -- Source Code, File, and Directory Disclosure Cheat Sheet -- Resources and Links -- Web-Related Tools. Pt. 1. Ch. 1. Ch. 2. Ch. 3. Ch. 4. Ch. 5. Pt. 2. Ch. 6. Ch. 7. Ch. 8. Pt. 3. Ch. 9. Ch. 10. Ch. 11. Ch. 12. Ch. 13. Ch. 14. Pt. 4. Ch. 15. Ch. 16. Ch. 17. App. A. App. B. App. C. App. D. App. E. App. F.
0201761769 (pbk.) 9788177582314
2002107711
Computer networks--Security measures.
Web sites--Security measures.
Computer security.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. - Boston : Addison-Wesley, c2003. - xxxi, 492 p. : ill. ; 24 cm.
Includes bibliographical references and index.
The E-Commerce Playground -- Web Languages: The Babylon of the 21st Century -- Web and Database Servers -- Shopping Carts and Payment Gateways -- HTTP and HTTPS: The Hacking Protocols -- URL: The Web Hacker's Sword -- URLs Unraveled -- Web: Under (the) Cover -- Reading Between the Lines -- Site Linkage Analysis -- How Do They Do It? -- Cyber Graffiti -- E-Shoplifting -- Database Access -- Java: Remote Command Execution -- Impersonation -- Buffer Overflowers: On-the-Fly -- Advanced Web Kung Fu -- Web Hacking: Automated Tools -- Worms -- Beating the IDS. Web and Database Port Listing -- HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- Remote Command Execution Cheat Sheet -- Source Code, File, and Directory Disclosure Cheat Sheet -- Resources and Links -- Web-Related Tools. Pt. 1. Ch. 1. Ch. 2. Ch. 3. Ch. 4. Ch. 5. Pt. 2. Ch. 6. Ch. 7. Ch. 8. Pt. 3. Ch. 9. Ch. 10. Ch. 11. Ch. 12. Ch. 13. Ch. 14. Pt. 4. Ch. 15. Ch. 16. Ch. 17. App. A. App. B. App. C. App. D. App. E. App. F.
0201761769 (pbk.) 9788177582314
2002107711
Computer networks--Security measures.
Web sites--Security measures.
Computer security.