LiveZilla Live Chat Software
Importitall
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Operating Systems > Linux > 1783988525
  1. Web Penetration Testing with Kali Linux - Second Edition
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Web Penetration Testing with Kali Linux - Second Edition

    [1783988525]
    Delivery: 10-20 Working Days
    Customer Ratings (5 USA reviews)
    Price R1394.00

     pinterest 
Additional Information

Build your defense against web attacks with Kali Linux 2.0

About This Book

  • Gain a deep understanding of the flaws in web applications and exploit them in a practical manner
  • Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0
  • Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit

Who This Book Is For

If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide.

What You Will Learn

  • Set up your lab with Kali Linux 2.0
  • Identify the difference between hacking a web application and network hacking
  • Understand the different techniques used to identify the flavor of web applications
  • Expose vulnerabilities present in web servers and their applications using server-side attacks
  • Use SQL and cross-site scripting (XSS) attacks
  • Check for XSS flaws using the burp suite proxy
  • Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks

In Detail

Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering.

At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX.

At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0.

Style and approach

This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.

Specifications

Country
USA
Author
Juned Ahmed Ansari
Binding
Paperback
EAN
9781783988525
Edition
2
ISBN
1783988525
Label
Packt Publishing - ebooks Account
Manufacturer
Packt Publishing - ebooks Account
MPN
black & white illustrations
NumberOfItems
1
NumberOfPages
292
PartNumber
black & white illustrations
PublicationDate
2015-12-01
Publisher
Packt Publishing - ebooks Account
ReleaseDate
2015-11-26
Studio
Packt Publishing - ebooks Account
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this product is based in the USA, and is designed and labelled to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Agricultural Remedies, Animals, Batteries, Flammable Materials, Farm Feeds, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Poinsons, Seeds, Supplements, Nutrients, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, information displayed above is for reference/informational purposes only and the item will not be imported. All content is generated and displayed from an automated USA product feed, and if the item cannot be imported for any reason, including carrier restrictions and/or import or sales restrictions under South African or American law, we do reserve the right to cancel and refund the order in full. If you are not sure if we are permitted to bring in an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.