O'Reilly logo

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by Mike Andrews, James A. Whittaker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5. Attacking User-Supplied Input Data

image

What’s In This Chapter?

This chapter details methods of tampering with input data that is passed from the client machine to the Web application that resides on the Web server. These attacks are mandatory for any Web application and represent some of the most commonly exploited vulnerabilities in modern Web applications.

Introduction

When a Web application or any program reads user-supplied input, many things can go wrong. The input may be too long, of the wrong type (for example, the user may have entered a character where a number was expected), or represent an illegal or harmful value (a user ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required