Web Application Hacking - The Art of Exploiting Vulnerable Web Application
This document discusses vulnerabilities in web applications and strategies for preventing attacks. It begins with an overview and survey of common vulnerabilities like injection flaws and cross-site scripting. It then examines vulnerabilities across application sub-tiers from the client level to the network level. The document provides examples of attacks at each tier and through the transport layer, compromised certificates, and DNS. It also profiles popular hacking tools and outlines primary protection steps like understanding the environment and prioritizing defenses based on risk. Finally, it discusses earning money through ethical hacking via bug bounty programs.
Primary Application ProtectionSteps
Understand your environment
Reduce your attack surface
Prioritize defenses based on RISK
Select flexible and integrated
defense tools
Integrate security into development
1
2
3
4
5