Book description
Defending your web applications against hackers and attackers
The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.
Each "recipe" shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more.
- Provides practical tactics for detecting web attacks and malicious behavior and defending against them
- Written by a preeminent authority on web application firewall technology and web application defense tactics
- Offers a series of "recipes" that include working code examples for the open-source ModSecurity web application firewall module
Find the tools, techniques, and expert information you need to detect and respond to web application attacks with Web Application Defender's Cookbook: Battling Hackers and Protecting Users.
Table of contents
- Cover
- Titlepage
- Foreword
- Introduction
-
Part I: Preparing the Battle Space
-
Chapter 1: Application Fortification
- Recipe 1-1: Real-time Application Profiling
- Recipe 1-2: Preventing Data Manipulation with Cryptographic Hash Tokens
- Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS)
- Recipe 1-4: Integrating Intrusion Detection System Signatures
- Recipe 1-5: Using Bayesian Attack Payload Detection
- HTTP Audit Logging
- Recipe 1-6: Enable Full HTTP Audit Logging
- Recipe 1-7: Logging Only Relevant Transactions
- Recipe 1-8: Ignoring Requests for Static Content
- Recipe 1-9: Obscuring Sensitive Data in Logs
- Recipe 1-10: Sending Alerts to a Central Log Host Using Syslog
- Recipe 1-11: Using the ModSecurity AuditConsole
-
Chapter 2: Vulnerability Identification and Remediation
- Internally Developed Applications
- Externally Developed Applications
- Virtual Patching
- Recipe 2-1: Passive Vulnerability Identification
- Active Vulnerability Identification
- Recipe 2-2: Active Vulnerability Identification
- Manual Vulnerability Remediation
- Recipe 2-3: Manual Scan Result Conversion
- Recipe 2-4: Automated Scan Result Conversion
- Recipe 2-5: Real-time Resource Assessments and Virtual Patching
- Chapter 3: Poisoned Pawns (Hacker Traps)
-
Chapter 1: Application Fortification
-
Part II: Asymmetric Warfare
- Chapter 4: Reputation and Third-Party Correlation
-
Chapter 5: Request Data Analysis
- Request Data Acquisition
- Recipe 5-1: Request Body Access
- Recipe 5-2: Identifying Malformed Request Bodies
- Recipe 5-3: Normalizing Unicode
- Recipe 5-4: Identifying Use of Multiple Encodings
- Recipe 5-5: Identifying Encoding Anomalies
- Input Validation Anomalies
- Recipe 5-6: Detecting Request Method Anomalies
- Recipe 5-7: Detecting Invalid URI Data
- Recipe 5-8: Detecting Request Header Anomalies
- Recipe 5-9: Detecting Additional Parameters
- Recipe 5-10: Detecting Missing Parameters
- Recipe 5-11: Detecting Duplicate Parameter Names
- Recipe 5-12: Detecting Parameter Payload Size Anomalies
- Recipe 5-13: Detecting Parameter Character Class Anomalies
-
Chapter 6: Response Data Analysis
- Recipe 6-1: Detecting Response Header Anomalies
- Recipe 6-2: Detecting Response Header Information Leakages
- Recipe 6-3: Response Body Access
- Recipe 6-4: Detecting Page Title Changes
- Recipe 6-5: Detecting Page Size Deviations
- Recipe 6-6: Detecting Dynamic Content Changes
- Recipe 6-7: Detecting Source Code Leakages
- Recipe 6-8: Detecting Technical Data Leakages
- Recipe 6-9: Detecting Abnormal Response Time Intervals
- Recipe 6-10: Detecting Sensitive User Data Leakages
- Recipe 6-11: Detecting Trojan, Backdoor, and Webshell Access Attempts
-
Chapter 7: Defending Authentication
- Recipe 7-1: Detecting Response Header Anomalies
- Recipe 7-2: Detecting the Submission of Multiple Usernames
- Recipe 7-3: Detecting Failed Authentication Attempts
- Recipe 7-4: Detecting a High Rate of Authentication Attempts
- Recipe 7-5: Normalizing Authentication Failure Details
- Recipe 7-6: Enforcing Password Complexity
- Recipe 7-7: Correlating Usernames with SessionIDs
- Chapter 8: Defending Session State
-
Chapter 9: Preventing Application Attacks
- Recipe 9-1: Blocking Non-ASCII Characters
- Recipe 9-2: Preventing Path-Traversal Attacks
- Recipe 9-3: Preventing Forceful Browsing Attacks
- Recipe 9-4: Preventing SQL Injection Attacks
- Recipe 9-5: Preventing Remote File Inclusion (RFI) Attacks
- Recipe 9-6: Preventing OS Commanding Attacks
- Recipe 9-7: Preventing HTTP Request Smuggling Attacks
- Recipe 9-8: Preventing HTTP Response Splitting Attacks
- Recipe 9-9: Preventing XML Attacks
-
Chapter 10: Preventing Client Attacks
- Recipe 10-1: Implementing Content Security Policy (CSP)
- Recipe 10-2: Preventing Cross-Site Scripting (XSS) Attacks
- Recipe 10-3: Preventing Cross-Site Request Forgery (CSRF) Attacks
- Recipe 10-4: Preventing UI Redressing (Clickjacking) Attacks
- Recipe 10-5: Detecting Banking Trojan (Man-in-the-Browser) Attacks
- Chapter 11: Defending File Uploads
- Chapter 12: Enforcing Access Rate and Application Flows
-
Part III: Tactical Response
- Chapter 13: Passive Response Actions
-
Chapter 14: Active Response Actions
- Recipe 14-1: Using Redirection to Error Pages
- Recipe 14-2: Dropping Connections
- Recipe 14-3: Blocking the Client Source Address
- Recipe 14-4: Restricting Geolocation Access Through Defense Condition (DefCon) Level Changes
- Recipe 14-5: Forcing Transaction Delays
- Recipe 14-6: Spoofing Successful Attacks
- Recipe 14-7: Proxying Traffic to Honeypots
- Recipe 14-8: Forcing an Application Logout
- Recipe 14-9: Temporarily Locking Account Access
- Chapter 15: Intrusive Response Actions
Product information
- Title: Web Application Defender's Cookbook
- Author(s):
- Release date: December 2012
- Publisher(s): Wiley
- ISBN: 9781118362181
You might also like
book
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, …
book
Securing Web Applications
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention …
book
Web Security for Developers
The world has changed. Today, every time you make a site live, you’re opening it up …
book
Apache Cookbook
Apache is far and away the most widely used web server platform in the world. Both …