LiveZilla Live Chat Software
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Operating Systems > Linux > 1783988525
  1. Web Penetration Testing with Kali Linux - Second Edition
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Web Penetration Testing with Kali Linux - Second Edition

    Delivery: 10-20 Working Days
    Customer Ratings (5 reviews)
    Price R1380.00

Additional Information

Build your defense against web attacks with Kali Linux 2.0

About This Book

  • Gain a deep understanding of the flaws in web applications and exploit them in a practical manner
  • Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0
  • Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit

Who This Book Is For

If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide.

What You Will Learn

  • Set up your lab with Kali Linux 2.0
  • Identify the difference between hacking a web application and network hacking
  • Understand the different techniques used to identify the flavor of web applications
  • Expose vulnerabilities present in web servers and their applications using server-side attacks
  • Use SQL and cross-site scripting (XSS) attacks
  • Check for XSS flaws using the burp suite proxy
  • Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks

In Detail

Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering.

At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX.

At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0.

Style and approach

This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.

Similar Products

Kali Linux Web Penetration Testing CookbookThe Hacker Playbook 2: Practical Guide To Penetration TestingBasic Security Testing with Kali Linux 2Intermediate Security Testing with Kali Linux 2Blue Team Field Manual (BTFM) (RTFM)Rtfm: Red Team Field ManualKali Linux: Wireless Penetration Testing Beginner's GuideThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsThe Network Security Test Lab: A Step-by-Step GuideThe Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

Juned Ahmed Ansari
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
black & white illustrations
black & white illustrations
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
Most Helpful Customer Reviews

The examples used in the book were extremely trivial and did not offer a lot of real insight into anything especially for the price tag. Save yourself the money and visit the OWASP site and their free documentation.
Great read. If you are new to either web penetration testing or kali linux, you'll learn a ton of very useful tools and techniques on how to determine hack-ability of a website. If you're not new to this, you'll be able to use this book as a great reference. YOu get tons of info and how-to's for each vulnerability. You get right to the nitty-gritty. The author attempt to help you get into the mind set of a person who would hack your site which helps to determine the various attack vectors. There were a few vectors mentioned that I did not think of, including some very useful shortcuts along the way. You could never really say this type of book is ever really "complete", but this is the most complete book I've read on the subject to date. Highly recommend it if you are on the fence.
I liked this book because the author gives a good immersion on the theme, he introduces about the ecosystem of web applications, the needs of security, the structure, major flaws and the possible attackers. The steps to execute the penetration test are crucial and he presented the points that you need to carry on, exploring the flaws with the possible doors and the best tools. Security technology is an activity where you can never stop, you have to have caution and your team prepared to solve the flaws fast as possible.

This book makes me understand what I need to do, what is more important, this subject is so dynamic that you never feel totally comfortable to deal with, but now I can see what an efficient pen test is like. So this book delivers what it promises and I would recommend for anyone who work or are interested on this topic, this book is very worthwhile.
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Animals, Batteries, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.