Skip to Content
Ethical Hacking and Penetration Testing Guide
book

Ethical Hacking and Penetration Testing Guide

by Rafay Baloch
September 2017
Beginner
532 pages
13h 31m
English
Auerbach Publications
Content preview from Ethical Hacking and Penetration Testing Guide

Chapter 12Web Hacking

Web applications are where majority of attacks are occuring now a days. Since past decade, we have seen an upward progression in the layers of insecurities where the attacks moving from Phsical layer up to application layer of the OSI model. This chapter is going to be probably the biggest in this book, and we will talk about some of the most common web application attacks, along with some server-side attacking techniques and strategies.

Let’s talk about web application attacks first. Almost every web application attack is due to unvalidated input: failure to validate input upon authentication, on form fields, or other inputs such as http headers and cookies. Web application hacking happens because either developers aren’t ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781351381345