Richa Gupta - Hands-on Penetration Testing for Web Applications
Here you can read online Richa Gupta - Hands-on Penetration Testing for Web Applications full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: BPB Publications, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Hands-on Penetration Testing for Web Applications
- Author:
- Publisher:BPB Publications
- Genre:
- Year:2021
- Rating:4 / 5
- Favourites:Add to favourites
- Your mark:
- 80
- 1
- 2
- 3
- 4
- 5
Hands-on Penetration Testing for Web Applications: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hands-on Penetration Testing for Web Applications" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Richa Gupta: author's other books
Who wrote Hands-on Penetration Testing for Web Applications? Find out the surname, the name of the author of the book and a list of all author's works by series.
Hands-on Penetration Testing for Web Applications — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hands-on Penetration Testing for Web Applications" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
- tag
- tag
Penetration Testing for
Web Applications
Using Nmap, Burp Suite and Wireshark
www.bpbonline.com
FIRST EDITION 2021
Copyright BPB Publications, India
ISBN: 978-93-89328-547
All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means or stored in a database or retrieval system, without the prior written permission of the publisher with the exception to the program listings which may be entered, stored and executed in a computer system, but they can not be reproduced by the means of publication, photocopy, recording, or by any electronic and mechanical means.
LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY
The information contained in this book is true to correct and the best of authors and publishers knowledge. The author has made every effort to ensure the accuracy of these publications, but publisher cannot be held responsible for any loss or damage arising from any information in this book.
All trademarks referred to in the book are acknowledged as properties of their respective owners but BPB Publications cannot guarantee the accuracy of this information.
Distributors:
BPB PUBLICATIONS
20, Ansari Road, Darya Ganj
New Delhi-110002
Ph: 23254990/23254991
MICRO MEDIA
Shop No. 5, Mahendra Chambers,
150 DN Rd. Next to Capital Cinema,
V.T. (C.S.T.) Station, MUMBAI-400 001
Ph: 22078296/22078297
DECCAN AGENCIES
4-3-329, Bank Street,
Hyderabad-500195
Ph: 24756967/24756400
BPB BOOK CENTRE
376 Old Lajpat Rai Market,
Delhi-110006
Ph: 23861747
Published by Manish Jain for BPB Publications, 20 Ansari Road, Darya Ganj, New Delhi-110002 and Printed by him at Repro India Ltd, Mumbai
www.bpbonline.com
My father
Richa Gupta is a Senior Security test engineer at Altran, where she is responsible for delivering Security Solutions to different financial, digital and retail verticals. Her 7 years of experience in the industry have been dominated by the technical aspects of application security, from the dual perspectives of a consulting and end-user implementation role. She has done attack-based security assessment and penetration testing. She has worked extensively with large-scale web application deployments in the Retail services industry. She has worked on many cloud solutions like AWS, Azure, GCP.
She is a certified penetration tester holding Certified Ethical Hacking (CEH) certification.
Your LinkedIn Profile:
https://www.linkedin.com/in/richa-gupta-366b6274/
Sachin Chadha has 13+ years of experience in the Information Security domain. He specializes in vulnerability assessment, penetration testing, application security, incident management, Governance Risk and Compliance (GRC), awareness training, and so on. Sachin is currently working in Aramco Asia as a Security Specialist (a subsidiary of Saudi Aramco). In the past, Sachin has worked with Fortune 500 companies. Sachin has worked extensively with the Government of India and with Intelligence Agencies in India. Sachin has done Masters in Computer Security from the UK and possesses more than 10 cybersecurity certifications. Sachin has received multiple awards from the information security community in India.
Vignesh Balasubramanian has over 4 years of experience in performing vulnerability assessments, penetration testing, and digital forensic investigations. Prior to becoming a cybersecurity professional, he worked as a Systems Integration Tester at Reliance Jio Infocomm Limited in Mumbai. Vignesh holds a Bachelors degree in Electronics and Telecommunication Engineering from Savitribai Phule Pune University. He is now working independently on cybersecurity training and consulting projects.
I am grateful to BPB Publications for giving me the opportunity to pen down my first book and letting me evolve as a writer. This book wouldnt have happened if I hadnt had the support of my family and friends. I would like to thank them for putting up with me while I was spending many weekends and evenings on writing. My gratitude goes to the team at Sopra Steria for providing valuable insights into some of the basic concepts.
As with any new class of technology, web applications have brought a new range of security vulnerabilities. There is a set of most commonly encountered vulnerabilities and people are aware of them over time, however, there are new attacks as well that were not considered when web applications were being developed. New technologies have been developed that have introduced new possibilities for exploitation. Some categories of security flaws are completely mitigated as a result of the mitigations made to the web browser software and other development technologies.
The most critical attacks against web applications are those that disclose sensitive data or gain unauthorized access to the web servers or other components on which the application is running. Zero-day vulnerabilities of high-intensity compromises occur frequently such as system downtime or website defacement, denial-of-service attacks can be used to compromise and create resource exhaustion against infrastructure.
So, web application security is the most significant area today for an organization to take care of.
The primary goal of this book is to provide information and skills that are necessary to understand from the security point of view of any web application. This book contains real-life examples that will show you how to discover, exploit, and mitigate various vulnerabilities as well as how to launch various automated tools to customize attacks. Over the 15 chapters in this book, you will learn the following:
, explains the importance of checking security flaws in web applications and its necessity as threats become more potent and prevalent.
, explains and discusses the various modern web application vulnerabilities.
, explains the methodology or approach to start with the penetration testing of web applications.
, explains the authentication mechanism and discusses various security flaws present in user authentication mechanisms.
, explains the session mechanism and discusses various security flaws present in user session management.
, explains secure communication channels and various vulnerabilities present in these communication channels.
Font size:
Interval:
Bookmark:
Similar books «Hands-on Penetration Testing for Web Applications»
Look at similar books to Hands-on Penetration Testing for Web Applications. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Hands-on Penetration Testing for Web Applications and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.