Skip to Content
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
book

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

by James A. Whittaker, Mike Andrews
February 2006
Intermediate to advanced
240 pages
5h 47m
English
Addison-Wesley Professional
Content preview from How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

CHAPTER 5. Attacking User-Supplied Input Data

image

What’s In This Chapter?

This chapter details methods of tampering with input data that is passed from the client machine to the Web application that resides on the Web server. These attacks are mandatory for any Web application and represent some of the most commonly exploited vulnerabilities in modern Web applications.

Introduction

When a Web application or any program reads user-supplied input, many things can go wrong. The input may be too long, of the wrong type (for example, the user may have entered a character where a number was expected), or represent an illegal or harmful value (a user ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Web Security Testing Cookbook

Web Security Testing Cookbook

Paco Hope, Ben Walther
Hands-On Security in DevOps

Hands-On Security in DevOps

Tony Hsiang-Chih Hsu

Publisher Resources

ISBN: 9780321657497Purchase book