Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Sinha, 2019 - Google Patents

Bug Bounty Hunting for Web Security

Sinha, 2019

Document ID
17025486768792099405
Author
Sinha S
Publication year

External Links

Snippet

In this book you will learn about implementing an offensive approach toward security bug hunting by finding vulnerabilities in web applications. You will also take a look at the type of tools necessary to build up this particular approach. You will learn how to use hacking tools …
Continue reading at link.springer.com (other versions)
  • 239000007924 injection 0 abstract description 103

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
Grossman XSS attacks: cross site scripting exploits and defense
Scambray et al. Hacking exposed: Web applications
Andrews et al. How to break web software: Functional and security testing of web applications and web services
Kirda et al. Client-side cross-site scripting protection
Huseby Innocent code: a security wake-up call for Web programmers
McDonald Web security for developers: real threats, practical defense
Cannings et al. Hacking exposed Web 2.0: Web 2.0 security secrets and solutions
Yaworski Real-world bug hunting: a field guide to web hacking
Lundeen et al. New ways im going to hack your web app
Snyder et al. Pro PHP security
Shema Seven deadliest web application attacks
Palmer Web application vulnerabilities: Detect, exploit, prevent
Süren et al. Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits.
Prasad Mastering modern Web penetration testing
Sinha Bug Bounty Hunting for Web Security
Oriyano et al. Client-side attacks and defense
Khan et al. Security assessment of four open source software systems
Kimak et al. An investigation into possible attacks on HTML5 indexedDB and their prevention
Dorrans Beginning ASP. NET Security
Alghofaili Security Analysis of Open Source Content Management Systems Wordpress, Joomla, and Drupal
Aleks et al. Black Hat GraphQL: Attacking Next Generation APIs
Baloch Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
Nu1L Team Advanced Web
Pantoulas Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention
Hromcová et al. Anatomy of native IIS malware