LiveZilla Live Chat Software
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Operating Systems > Linux > 1783988525
  1. Web Penetration Testing with Kali Linux - Second Edition
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Web Penetration Testing with Kali Linux - Second Edition

    Delivery: 10-20 Working Days
    Price R1471.00

Additional Information

Build your defense against web attacks with Kali Linux 2.0

About This Book

  • Gain a deep understanding of the flaws in web applications and exploit them in a practical manner
  • Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0
  • Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit

Who This Book Is For

If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide.

What You Will Learn

  • Set up your lab with Kali Linux 2.0
  • Identify the difference between hacking a web application and network hacking
  • Understand the different techniques used to identify the flavor of web applications
  • Expose vulnerabilities present in web servers and their applications using server-side attacks
  • Use SQL and cross-site scripting (XSS) attacks
  • Check for XSS flaws using the burp suite proxy
  • Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks

In Detail

Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering.

At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX.

At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0.

Style and approach

This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.

Similar Products

Basic Security Testing with Kali Linux 2Intermediate Security Testing with Kali Linux 2The Hacker Playbook 2: Practical Guide To Penetration TestingKali Linux: Wireless Penetration Testing Beginner's GuideRtfm: Red Team Field ManualThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsMastering Kali Linux for Advanced Penetration Testing

Juned Ahmed Ansari
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
black & white illustrations
black & white illustrations
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Animals, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.