O'Reilly logo

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition by Marcus Pinto, Dafydd Stuttard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Questions

Answers can be found at http://mdsec.net/wahh.

  1. What is the OPTIONS method used for?
  2. What are the if-Modified-since and If-None-Match headers used for? Why might you be interested in these when attacking an application?
  3. What is the significance of the secure flag when a server sets a cookie?
  4. What is the difference between the common status codes 301 and 302?
  5. How does a browser interoperate with a web proxy when SSL is being used?

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required