Book description
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.
Hoffman, senior staff security engineer at Ripple, also provides information regarding exploits and mitigations for several additional web application technologies such as GraphQL, cloud-based deployments, content delivery networks (CDN) and server-side rendering (SSR). Following the curriculum from the first book, this second edition is split into three distinct pillars comprising three separate skill sets:
- Pillar 1: Recon—Learn techniques for mapping and documenting web applications remotely, including procedures for working with web applications
- Pillar 2: Offense—Explore methods for attacking web applications using a number of highly effective exploits that have been proven by the best hackers in the world. These skills are valuable when used alongside the skills from Pillar 3.
- Pillar 3: Defense—Build on skills acquired in the first two parts to construct effective and long-lived mitigations for each of the attacks described in Pillar 2.
Publisher resources
Table of contents
-
Preface
- Changes from the First Edition
- Prerequisite Knowledge and Learning Goals
- Why Are Examples in JavaScript?
- Why Teach Concepts Instead of Tools?
- Suggested Background
- Minimum Required Skills
- Who Benefits Most from Reading This Book?
- How Is This Book Organized?
- Language and Terminology
- Summary
- Conventions Used in This Book
- O’Reilly Online Learning
- How to Contact Us
- Acknowledgments
-
1. The History of Software Security
- The Origins of Hacking
- The Enigma Machine, Circa 1930
- Automated Enigma Code Cracking, Circa 1940
- Telephone “Phreaking,” Circa 1950
- Anti-Phreaking Technology, Circa 1960
- The Origins of Computer Hacking, Circa 1980
- The Rise of the World Wide Web, Circa 2000
- Hackers in the Modern Era, Circa 2015+
- Summary
- I. Recon
- 2. Introduction to Web Application Reconnaissance
- 3. The Structure of a Modern Web Application
- 4. Finding Subdomains
- 5. API Analysis
- 6. Identifying Third-Party Dependencies
- 7. Identifying Weak Points in Application Architecture
- 8. Part I Summary
- II. Offense
- 9. Introduction to Hacking Web Applications
- 10. Cross-Site Scripting
- 11. Cross-Site Request Forgery
- 12. XML External Entity
- 13. Injection
- 14. Denial of Service
- 15. Attacking Data and Objects
- 16. Client-Side Attacks
- 17. Exploiting Third-Party Dependencies
- 18. Business Logic Vulnerabilities
- 19. Part II Summary
- III. Defense
- 20. Securing Modern Web Applications
- 21. Secure Application Architecture
- 22. Secure Application Configuration
- 23. Secure User Experience
- 24. Threat Modeling Applications
- 25. Reviewing Code for Security
- 26. Vulnerability Discovery
- 27. Vulnerability Management
- 28. Defending Against XSS Attacks
- 29. Defending Against CSRF Attacks
- 30. Defending Against XXE
- 31. Defending Against Injection
- 32. Defending Against DoS
- 33. Defending Data and Objects
- 34. Defense Against Client-Side Attacks
- 35. Securing Third-Party Dependencies
- 36. Mitigating Business Logic Vulnerabilities
- 37. Part III Summary
- Conclusion
- Index
- About the Author
Product information
- Title: Web Application Security, 2nd Edition
- Author(s):
- Release date: January 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098143930
You might also like
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
book
Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. …
book
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …
video
CISSP, 4th Edition
28+ hours of video instruction Get the edge you need to ace the CISSP exam! Understand …