Ethical hacking and countermeasures. Book 3, Web applications and data servers [2nd ed] 9781305883451, 1001001001, 1305883454

The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topi

1,736 472 13MB

English Pages xvii, 187 pages: color illustrations; 24 cm [209] Year 2016;2017

Report DMCA / Copyright

DOWNLOAD FILE

Ethical hacking and countermeasures. Book 3, Web applications and data servers [2nd ed]
 9781305883451, 1001001001, 1305883454

Table of contents :
Cover......Page 1
IFC......Page 2
Title......Page 3
Statement......Page 4
Copyright......Page 5
Brief Table of Contents......Page 6
Table of Contents......Page 8
Preface......Page 14
Acknowledgments......Page 20
Ch 1: After Completing This Chapter, You Should Be Able To:......Page 22
Ch 1: Introduction to Session Hijacking......Page 23
Session Hijacking......Page 24
Ch 1: Chapter Summary......Page 42
Ch 1: Review Questions......Page 43
Ch 1: Hands-On Projects......Page 45
Ch 2: After Completing This Chapter, You Should Be Able To:......Page 48
Ch 2: Introduction to Hacking Web Servers......Page 49
Sources of Security Vulnerabilities in Web Servers......Page 50
Web Site Defacement......Page 51
Attacks Against Internet Information Services......Page 52
IIS 7 Components......Page 54
Patch Management......Page 69
Vulnerability Scanners......Page 71
Ch 2: Review Questions......Page 80
Ch 2: Hands-On Projects......Page 82
Ch 3: After Completing This Chapter, You Should Be Able To:......Page 86
Web Applications......Page 87
Web Application Hacking......Page 89
Web Application Threats......Page 90
Web Application Hacking Tools......Page 106
Ch 3: Review Questions......Page 115
Ch 3: Hands-On Projects......Page 117
Ch 4: After Completing This Chapter, You Should Be Able To:......Page 120
Authentication......Page 121
Authentication Techniques......Page 122
Password Cracking......Page 129
Tools......Page 135
Ch 4: Key Terms......Page 146
Ch 4: Review Questions......Page 147
Ch 4: Hands-On Projects......Page 148
Ch 5: After Completing This Chapter, You Should Be Able To:......Page 150
Ch 5: Introduction to Hacking Web Browsers......Page 151
How Web Browsers Work......Page 152
Hacking Firefox......Page 153
Cookies......Page 154
Firefox Security......Page 155
Hacking Internet Explorer......Page 156
Internet Explorer Security......Page 157
Hacking Opera......Page 161
Hacking Safari......Page 162
Ch 5: Chapter Summary......Page 163
Ch 5: Review Questions......Page 164
Ch 5: Hands-On Projects......Page 166
Ch 6: After Completing This Chapter, You Should Be Able To:......Page 168
Ch 6: Introduction to SQL Injection......Page 169
Attacking Oracle......Page 170
Breaking into an Oracle Database......Page 171
OLE DB Errors......Page 172
Input Validation Attack......Page 176
SQL Injection Techniques......Page 177
How It Works......Page 180
SQL Injection in MySQL......Page 182
Hacking an SQL Server......Page 183
Attacks Against Microsoft SQL Server......Page 186
Tools for Automated SQL Injection......Page 188
SQL Injection Countermeasures......Page 192
Preventing SQL Injection Attacks......Page 193
Security Tools......Page 195
Security Checklists......Page 196
Ch 6: Chapter Summary......Page 198
Ch 6: Review Questions......Page 199
Ch 6: Hands-On Projects......Page 201
Glossary......Page 202
Index......Page 204

Polecaj historie