XSS Attacks Cross Site Scripting Exploits and Defense 1st edition by Seth Fogie, Jeremiah Grossman- Ebook PDF Instant Download/Delivery.9780080553405, 0080553400
Full download XSS Attacks Cross Site Scripting Exploits and Defense 1st edition after payment
Product details:
ISBN 10: 0080553400
ISBN 13: 9780080553405
Author: Seth Fogie; Jeremiah Grossman; Robert Hansen; Anton Rager; Petko D. Petkov
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
XSS Attacks Cross Site Scripting Exploits and Defense 1st Table of contents:
Chapter 1: Cross-site Scripting Fundamentals
- Introduction
- Web Application Security
- XML and AJAX Introduction
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 2: The XSS Discovery Toolkit
- Introduction
- Burp
- Debugging DHTML With Firefox Extensions
- Analyzing HTTP Traffic with Firefox Extensions
- GreaseMonkey
- Hacking with Bookmarklets
- Using Technika
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 3: XSS Theory
- Introduction
- Getting XSS’ed
- DOM-based XSS In Detail
- Redirection
- CSRF
- Flash, QuickTime, PDE Oh My
- HTTP Response Injection
- Source vs. DHTML Reality
- Bypassing XSS Length Limitations
- XSS Filter Evasion
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 4: XSS Attack Methods
- Introduction
- History Stealing
- Intranet Hacking
- XSS Defacements
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- References
Chapter 5: Advanced XSS Attack Vectors
- Introduction
- DNS Pinning
- IMAP3
- MHTML
- Hacking JSON
- Summary
- Frequently Asked Questions
Chapter 6: XSS Exploited
- Introduction
- XSS vs. Firefox Password Manager
- SeXXS Offenders
- Equifraked
- Owning the Cingular Xpress Mail User
- Alternate XSS: Outside the BoXXS
- XSS Old School- Windows Mobile PIE 4.2
- XSSing Firefox Extensions
- XSS Exploitation: Point-Click-Own with EZPhotoSales
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 7: Exploit Frameworks
- Introduction
- AttackAPI
- BeEF
- CAL9000
- Overview of XSS-Proxy
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 8: XSS Worms
- Introduction
- Exponential XSS
- XSS Warhol Worm
- Linear XSS Worm
- Samy Is My Hero
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Chapter 9: Preventing XSS Attacks
- Introduction
- Filtering
- Input Encoding
- Output Encoding
- Web Browser’s Security
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Appendix A: The Owned List
People also search for XSS Attacks Cross Site Scripting Exploits and Defense 1st :
xss attacks cross site scripting exploits and defense 1st edition
xss attack example
stored xss attack example
xss attack real example