售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Title Page
Copyright and Credits
Learning Python Web Penetration Testing
Packt Upsell
Why subscribe?
PacktPub.com
Contributor
About the author
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Get in touch
Reviews
Introduction to Web Application Penetration Testing
Understanding the web application penetration testing process
Typical web application toolkit
HTTP Proxy
Crawlers and spiders
Vulnerability scanners
Brute forces/predictable resource locators
Specific task tools
Testing environment
Summary
Interacting with Web Applications
HTTP protocol basics
What is HTTP and how it works?
Anatomy of an HTTP request
HTTP headers
GET request
Interacting with a web app using the requests library
Requests library
Our first script
Setting headers
Analyzing HTTP responses
HTTP codes
Summary
Web Crawling with Scrapy – Mapping the Application
Web application mapping
Creating our own crawler/spider with Scrapy
Starting with Scrapy
Making our crawler recursive
Scraping interesting stuff
Summary
Resources Discovery
What is resource discovery?
Building our first BruteForcer
Analysing the results
Adding more information
Entering the hash of the response content
Taking screenshots of the findings
Summary
Password Testing
How password attacks work
Password cracking
Password policies and account locking
Our first password BruteForcer
Basic authentication
Creating the password cracker
Adding support for digest authentication
What is digest authentication?
Adding digest authentication to our script
Form-based authentication
Form-based authentication overview
Summary
Detecting and Exploiting SQL Injection Vulnerabilities
Introduction to SQL injection
SQLi versus blind SQLi
Detecting SQL injection issues
Methods for detecting SQLi
Automating the detection
Exploiting a SQL injection to extract data
What data can we extract with an SQLi?
Automating basic extractions
Advanced SQLi exploiting
Summary
Intercepting HTTP Requests
HTTP proxy anatomy
What is an HTTP proxy?
Why do we need a proxy?
Types of HTTP proxy
Introduction to mitmproxy
Why mitmproxy?
Manipulating HTTP requests
Inline scripts
Automating SQLi in mitmproxy
SQLi process
Summary
Other Books You May Enjoy
Leave a review - let other readers know what you think
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜