The President'e(tm)s life is in danger! Jimmy Sniffles, with the help of a new invention, shrinks down to miniature size to sniff out the source of the problem. This description may be from another edition of this product.
So you heard all this hype on Web Hacking, and want to know more about this matter.Well, if you think about the web as an e-commerce platform, then just Buy 'Web Security, Privacy & Commerce' by Garfinkel and Spafford, an excellent and classic book.Are you interested in 'pure hacking'? I mean 'perl scripts', cross site and traversal attacks, hackers jargon, and all the related issues..... then buy 'Hacking Web Applications Exposed' by Scambray and Shema. Excellent book too, and excellent authors. But beware, it is not for newbies. You MUST have a lot of background to fully understand the attacks.Now, what about an easier generic book, covering the same issues as the others but in a step by step and kinder way.? A book to start from zero, but leading to understand all the currently related themes. Well, if this is what you want, then 'Web Hacking' is your book. It covers all that need to be covered in this area. In an easy and well structured way. The reading is very light and the authors 'break down' of the matter, makes the contents very intuitive.The book is structured into four main sections (covering the same areas as the previously referred books) :** The E-commerce Playground ** URLs Unraveled** How Do They Do It?** Advanced Web Kung FuIt includes also, several interesting appendixes (specially useful the 'cheat sheet' appendix).A lot of simple case studies (of the kind 'Bob and Alice') are presented as well as some more technical analyses (Code Red, Nimda etc.)If I were to select a book as a reference for a first course on web security, 'Web Hacking' would be my choise. Definitively.
Hacking - Readers Are Shown How It's Done!
Published by Thriftbooks.com User , 22 years ago
During the last several years we have seen a sharp rise in the number of methods employed to hack into computer systems worldwide. The frequency of such attacks is alarming and the consequences are staggering. Clever minds, basic computer and programming skills, and knowledge of system exploits coupled with the intent to cause harm of one kind or another is a hard combination to beat. Stuart McClure, Saumil Shah, and Shreeraj Shah have written Web Hacking: Attacks and Defense to provide solid insight into the very strategies involved to successfully hack into vulnerable computer systems. This book features extensive coverage of popular and lesser known exploits that allows successful hacking to take place. Readers will read up on them, they can actually challenge them - hopefully against their own systems, and they can prepare their own strategies to counter possible future hacking attempts against their own systems. I was truly amazed as I read one system exploit after another - it seemed so easy for people to go hacking these days. Case studies were intriguing - Website defacement, intercepting and deleting e-mail messages, determining passwords, stealing identities, shopping cart shoplifting, credit card fraud, and more. I easily concluded that just about anyone with basic programming skills could have a serious go at hacking into a computer system if armed with the information provided in this book. The authors walk readers through actual hacking processes using programming code lines, screen shots, graphical diagram analysis, and they discuss in plain English how hacking attempts and other forms of mischief takes place. In short - readers are put in the hacker's seat and shown how to do it. Readers are also introduced to a number of popular hacking tools used to apply the hacking craft - username and password crackers, Web proxies, cookie programs, and other tools used to insert and extract useful information. The intention of the book is clear - to create serious awareness of hacking threats and to offer readers - individuals, IT department professionals, Web developers, business leaders, and other concerned parties, the information they need to adequately safeguard their systems and client data. They will learn how various servers, server software, and program languages work and how best to deploy them for optimum security. Although no computer system may be 100% hack-proof, taking serious precautions and putting into use the countermeasures and advice provided in this book will reduce the likelihood of major intrusion attempts. Although the contents of this book appears overwhelming at times, readers should take heart in knowing that they are learning about the serious nature of hacking and criminal activity associated with it. Some hackers are people with easily obtained computer tools who are out to prove their skills while others want to steal or exact revenge. Regardless of their skill levels and intentions, they p
Grab a cup of ?joe? curl up in a comfy place and get ready f
Published by Thriftbooks.com User , 22 years ago
Web Hacking, Attacks and Defense by Stuart McClure, Saumil Shah and Shreeraj Shah is an excellent introductory level book to the world of web hacking. If you are a seasoned professional you will also enjoy having this book in your collection, as it is an excellent resource book.Ever wonder how anyone can enter a web site and see more than what's presented? With a clear understanding of the protocols, web languages, an understanding of the processes behind e commerce and a bit of historical knowledge you too can hack a web site, and wind up on the FBI's most wanted list. But by the same token, a little bit of knowledge is a powerful thing, with the information presented here you can easily get started on the road to keeping the hackers out, and damage to a minimum if they do get in.The chapters are clearly laid out, and include code with explanations of the weaknesses, referrals to more in depth study, precautionary measures you can take to help secure your site and a look at the various tools available to harden your site. IIS and Apache are reviewed, along with Oracle and SQL Server to show some of the more popular Web Servers and Databases, how they work, are exploited and ways to harden them against attack. The protocols used by the web, web programming languages, and an explanation of how a browser interprets commands are graphically laid out with examples presented. It would be hard to come away from this book with out an understanding of the concepts, as they are so clearly defined. Everything from setting a common understanding of terms to basic E Commerce concepts to unraveling Code Red and a truly unique presentation of IDS (Intrusion Detection Systems) is presented and well worth the time it takes to read.Enjoy!
Engrossing, thorough and full of surprises
Published by Thriftbooks.com User , 22 years ago
Although this book's primary purpose is to explain how to defend against web hacking, it's also one of the most thorough descriptions of how web servers, applications servers and database servers work. Moreover, it's so well written and engrossing that it is hard to put down - I read it in a weekend.My role regarding security is more process-oriented, although I have a fairly deep knowledge of the technical aspects. I, like many others, assumed that HTTP (port 80 services) poses nominal security exposures. Before I was finished with the first chapter that erroneous belief had been completely destroyed. What make the magnitude of the risks and exposures of seemingly secure aspects of web systems behind a firewall so real is the way you're walked through how to breach backend systems via HTTP. In addition, each language and scripting environment commonly used in web systems are examined for security implications. Seeing these was the second major surprise in the book. As the book progresses the technical detail gets deeper, and the ways systems can be breached get more sophisticated. Each of the exposures that the book highlights can be independently verified by following the procedures given on test systems (of someone else's system if you have a malicious bent). Even if security isn't your major concern you'll greatly benefit from this book because the authors completely explain how web systems work at a deep technical level, and do clearly. If you are involved in security you'll find exposures and risks in places you never suspected, such in intrusion detection systems, firewalls, and even comments in scripts and mark-up files.This book can be read and understood by moderately technical readers, such as IT managers, and should be read by developers who want to harden their code, auditors and security assessment team members, and systems and network administrators who need to plug the holes left by product defaults or are targets for intruders.
Excellent, a _must_ read
Published by Thriftbooks.com User , 22 years ago
This book has a wealth of information on the subject of Web Hacking. As an administrator responsible for the well-being of various web servers, it is important for me to keep up with the vulnerabilities and know the tactics of crackers, and this book filled me in with more than enough knowledge.The book starts out with good introduction on the topic of web languages, and leads you to various topics such as finding and exploiting buffer overflows. There is a _lot_ of ground covered in this book including databases, cracking tools, SQL code injection, countermeasures, etc. If you are responsible for any host sitting on the internet, this is your bible.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.