Active Members Fi8sVrs Posted March 9, 2014 Active Members Report Posted March 9, 2014 TABLE OF CONTENTSCover imageTitle pageCopyrightDedication[LIST][*]Acknowledgments[/LIST]Honey BearLizardBaby BirdFamily And FriendsSecurity CommunityScott White Technical ReviewerSyngress TeamMy VicesBiographyForeword[LIST][*]Introduction[/LIST]About This BookA Hands-On ApproachWhat's In This Book?A Quick Disclaimer[LIST][*]Chapter 1. The Basics of Web Hacking[/LIST]Chapter Rundown:IntroductionWhat Is A Web Application?What You Need To Know About Web ServersWhat You Need To Know About HTTPThe Basics Of Web Hacking: Our ApproachWeb Apps Touch Every Part Of ITExisting MethodologiesMost Common Web VulnerabilitiesSetting Up A Test Environment[LIST][*]Chapter 2. Web Server Hacking[/LIST]Chapter Rundown:IntroductionReconnaissancePort ScanningVulnerability ScanningExploitationMaintaining Access[LIST][*]Chapter 3. Web Application Recon and Scanning[/LIST]Chapter Rundown:IntroductionWeb Application ReconWeb Application Scanning[LIST][*]Chapter 4. Web Application Exploitation with Injection[/LIST]Chapter Rundown:IntroductionSQL Injection VulnerabilitiesSQL Injection AttacksSqlmapOperating System Command Injection VulnerabilitiesOperating System Command Injection AttacksWeb Shells[LIST][*]Chapter 5. Web Application Exploitation with Broken Authentication and Path Traversal[/LIST]Chapter Rundown:IntroductionAuthentication And Session VulnerabilitiesPath Traversal VulnerabilitiesBrute Force Authentication AttacksSession AttacksPath Traversal Attacks[LIST][*]Chapter 6. Web User Hacking[/LIST]Chapter Rundown:IntroductionCross-Site Scripting (XSS) VulnerabilitiesCross-Site Request Forgery (CSRF) VulnerabilitiesTechnical Social Engineering VulnerabilitiesWeb User ReconWeb User ScanningWeb User ExploitationCross-Site Scripting (XSS) AttacksReflected XSS AttacksStored XSS AttacksCross-Site Request Forgery (CSRF) AttacksUser Attack Frameworks[LIST][*]Chapter 7. Fixes[/LIST]Chapter Rundown:IntroductionWeb Server FixesWeb Application FixesWeb User Fixes[LIST][*]Chapter 8. Next Steps[/LIST]Chapter Rundown:IntroductionSecurity Community Groups And EventsFormal EducationCertificationsAdditional BooksIndexDownload:http://www.scribd.com/doc/211448113/The-Basics-of-Web-Hacking Quote