Bug bounty hunting for web security find and exploit vulnerabilities in web sites and applications
Taking a close look at the types of tools available to you, this book explains how learning to find vulnerabilities in websites will help you become a better penetration tester. --
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
[New York, New York], New York, NY
Apress, Springer Science+Business Media New York
2019
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Chapter 1: Introduction to Hunting Bugs
- Chapter 2: Setting up Your Environment
- Chapter 3: How to inject Request Forgery
- Chapter 4: How to exploit through Cross Site Scripting (XSS)
- Chapter 5: Header Injection and URL Redirection
- Chapter 6: Malicious Files
- Chapter 7: Poisoning Sender Policy Framework (SPF)
- Chapter 8: Injecting Unintended XML
- Chapter 9: Finding Command Injection Vulnerabilities
- Chapter 10: Finding HTML and SQL Injection Vulnerabilities
- Appendix: Further Reading