Sinha, 2019 - Google Patents
Bug Bounty Hunting for Web SecuritySinha, 2019
- Document ID
- 17025486768792099405
- Author
- Sinha S
- Publication year
External Links
Snippet
In this book you will learn about implementing an offensive approach toward security bug hunting by finding vulnerabilities in web applications. You will also take a look at the type of tools necessary to build up this particular approach. You will learn how to use hacking tools …
- 239000007924 injection 0 abstract description 103
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Grossman | XSS attacks: cross site scripting exploits and defense | |
Scambray et al. | Hacking exposed: Web applications | |
Andrews et al. | How to break web software: Functional and security testing of web applications and web services | |
Kirda et al. | Client-side cross-site scripting protection | |
Huseby | Innocent code: a security wake-up call for Web programmers | |
McDonald | Web security for developers: real threats, practical defense | |
Cannings et al. | Hacking exposed Web 2.0: Web 2.0 security secrets and solutions | |
Yaworski | Real-world bug hunting: a field guide to web hacking | |
Lundeen et al. | New ways im going to hack your web app | |
Snyder et al. | Pro PHP security | |
Shema | Seven deadliest web application attacks | |
Palmer | Web application vulnerabilities: Detect, exploit, prevent | |
Süren et al. | Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. | |
Prasad | Mastering modern Web penetration testing | |
Sinha | Bug Bounty Hunting for Web Security | |
Oriyano et al. | Client-side attacks and defense | |
Khan et al. | Security assessment of four open source software systems | |
Kimak et al. | An investigation into possible attacks on HTML5 indexedDB and their prevention | |
Dorrans | Beginning ASP. NET Security | |
Alghofaili | Security Analysis of Open Source Content Management Systems Wordpress, Joomla, and Drupal | |
Aleks et al. | Black Hat GraphQL: Attacking Next Generation APIs | |
Baloch | Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting | |
Nu1L Team | Advanced Web | |
Pantoulas | Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention | |
Hromcová et al. | Anatomy of native IIS malware |