CHAPTER 15
Exploiting Web Applications
This chapter shows you advanced techniques for finding and exploiting common vulnerabilities in web applications, even with proper security controls in place. You will learn how to find design flaws in real scenarios and, more importantly, how to fix them.
In particular, this chapter covers the following topics:
• Overview of the most common web vulnerabilities in the last decade
• SQL injection via MD5 hash injection and multibyte encoding injection
• Exploiting type conversion in MySQL 5.x
• Hunting cross-site scripting (XSS)
• Unicode normalization forms attack with Fiddler2 Proxy
Overview of the Top 10 Web Vulnerabilities ...
Get Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.