Book Description
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.
Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You'll learn methods for effectively researching and analyzing modern web applications - including those you don't have direct access to. You'll also learn how to break into web applications using the latest hacking techniques. Finally, you'll learn how to develop mitigations for use in your own web applications to protect against hackers.
- Explore common vulnerabilities plaguing today's web applications;
- Learn essential hacking techniques attackers use to exploit applications;
- Map and document web applications for which you don't have direct access;
- Develop and deploy customized exploits that can bypass common defenses;
- Develop and deploy mitigations to protect your applications against hackers;
- Integrate secure coding best practices into your development lifecycle;
- Get practical tips to help you improve the overall security of your web applications.
This open access book is Complimented by Nginx. You can download Web Application Security ebook for free in PDF format (5.2 MB).
Table of Contents
Chapter 1
The History of Software Security
Chapter 2
Introduction to Web Application Reconnaissance
Chapter 3
The Structure of a Modern Web Application
Chapter 4
Finding Subdomains
Chapter 5
API Analysis
Chapter 6
Identifying Third-Party Dependencies
Chapter 7
Identifying Weak Points in Application Architecture
Chapter 8
Part I Summary
Chapter 9
Introduction to Hacking Web Applications
Chapter 10
Cross-Site Scripting (XSS)
Chapter 11
Cross-Site Request Forgery (CSRF)
Chapter 12
XML External Entity (XXE)
Chapter 13
Injection
Chapter 14
Denial of Service (DoS)
Chapter 15
Exploiting Third-Party Dependencies
Chapter 16
Part II Summary
Chapter 17
Securing Modern Web Applications
Chapter 18
Secure Application Architecture
Chapter 19
Reviewing Code for Security
Chapter 20
Vulnerability Discovery
Chapter 21
Vulnerability Management
Chapter 22
Defending Against XSS Attacks
Chapter 23
Defending Against CSRF Attacks
Chapter 24
Defending Against XXE
Chapter 25
Defending Against Injection
Chapter 26
Defending Against DoS
Chapter 27
Securing Third-Party Dependencies
Chapter 28
Part III Summary
Chapter 29
Conclusion