TABLE OF CONTENTSPROLOGUE iTABLE of CONTENTS iiLIST of ACRONYMS vCATEGORY DRAWINGS viCHAPTER 1: overview of NETWORK SECURITY and WEB APPLICATION 11.1 OVERVIEW of NETWORK SECURITY 11.1.1 Introduction to network security 11.1.2 reviews safety issues, 4 network security1.2 OVERVIEW of the WEB APPLICATION 61.2.1. introduction 6 Website1.2.2 the concept of WEB applications 71.2.3 some terms in the WEB application 8WEB application architecture 1.2.4 131.2.5 the principle operates a WEB applications 14CHAPTER 2: the ATTACK TECHNIQUES and BASIC WEB APPLICATION SECURITY 162.1 the DEFICIENCIES in the CHECKING of DATA ENTERED on 162.1.1 buffer overflow (Buffer Overflow) 162.1.2 Crossed paths (Directory Traversal) 1617 2.1.3 hollow characters2.2 OPERATION on the PARAMETER PASSED 182.2.1 18 URL actions2.2.2 manipulating variables hidden in Form 192.2.3 operation with 20 Cookies2.3 POSSESSION of the SESSION 212.3.1 fixing session (Session Fixation) 212.3.2 stolen session (Session Hijacking) 232.4 DENIAL of SERVICE (DOS) 242.4.1 The aim of DOS attack 242.4.2 25 attack techniques2.4.3 some corrective security measures 282.5 INSERT SQL (SQL Injection) 282.5.1 28 attack techniques2.5.2 a number of security measures to fix 312.6 INSERT EXECUTABLE CODE on the BROWSER VICTIM (Cross Site Scripting) 312.6.1 31 attack techniques2.6.2 some security fix 35CHAPTER 3: SOME TECHNICAL DEMO WEB APPLICATION ATTACK 363.1 CODE INSERTION ATTACK TECHNIQUES SQL (SQL INJECTION) 363.1.1 preparation of 363.1.2 attack 373.2 TECHNICAL DENIAL of SERVICE ATTACK (DOS) 38 WEBSITE3.2.1 preparing 383.2.2 attack 393.3 ENGINEERING PHISHING WEBSITES (WEB PHISHING) 423.3.1 preparation 423.3.2 attack 423.4 TECHNICAL ATTACK through PROXY FORGE 433.4.1 preparation of 433.4.2 attack 44CHAPTER 4: SUMMARIZING the PROCESS HACKER ATTACK 464.1 GATHER INFORMATION at a level of INFRASTRUCTURE, 464.1.1 FootPrinting (in the footprint) 464.1.2 Scanning (Scan probe) 494.1.3 Enmeration (lists of vulnerabilities) 514.1.4 Gaining Access (task) 524.1.5 Escalating privilege (privilege escalation) 544.1.6 Pilfering (file contains password blank) 544.1.7 Covering Tracks (tracks) 544.1.8 Creating Backdoors (created loopholes for the next penetration easier) 554.2 WEB APP SURVEY 554.3 STRUCK 56CHAPTER 5: INTRODUCING SOME WEB APPLICATION SECURITY TOOLS 575.1 the WEB APP SECURITY TOOL 57WEB APPLICATION FIREWALL 5.2 59CONCLUSION 61The MATTER ACHIEVED through 61 TOPICSLIMITED in 61 TOPICS61 DEVELOPMENTREFERENCE 62
đang được dịch, vui lòng đợi..
