Jump to ratings and reviews
Rate this book

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Rate this book
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. Since this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

426 pages, Paperback

Published February 28, 2018

1 person is currently reading
21 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (6%)
4 stars
3 (20%)
3 stars
9 (60%)
2 stars
2 (13%)
1 star
0 (0%)
Displaying 1 - 3 of 3 reviews
Profile Image for BCS.
218 reviews33 followers
August 28, 2018
Recently there has been news, globally, of gigantic information ruptures, mishandling of the functionalities of the web for creating deception or accumulation of client data, to promote organisations’ objectives. Individuals are beginning to be more worried about how their data is utilised and kept safe by the organisations they trust with it. In this way, businesses need to take proactive activities to keep such breaks or assaults from happening. This is done on numerous fronts, from stricter quality controls amid the advancement procedure to PR, to dealing with the nearness of the media when an episode is recognised.

Since advancement cycles in web applications are shorter and significantly more potent with current techniques, expanding the multifaceted nature in many advances is required to make a cutting-edge web application. This many-sided quality in web applications and in the improvement procedure itself requires an expert who has spent significant time in security testing, who gets engaged with the method and assumes liability of putting the application to test from a security viewpoint, more particularly, from an aggressor's perspective. This expert is a web penetration analyser.

In the digital age, web penetration professionals would benefit from the technical contributions in this book. Students on the apprenticeship programme as well as in higher education will find the book insightful. The web in its current and emerging applications have become a piece of our everyday life. Businesses and individuals have taken the use of web and associated applications as a rule for underscoring daily activities. This reality alone makes web applications an appealing focus for data hoodlums and different culprits. Subsequently, shielding these applications and their foundation from assaults is of prime significance for designers and proprietors.

In this book, the authors go from the essential ideas of web applications and penetration testing, to cover each stage with a traction approach; from picking up data to recognising conceivable frail spots to misusing vulnerabilities. An essential undertaking of an entrance analyser is this: once they find and check helplessness, they must prompt the practitioners on the best way to fix such defects and keep them from repeating. The authors have committed every chapter to distinguishing proof and abuse of vulnerabilities, likewise incorporating a segment quickly covering how to forestall and moderate every one of such assaults.

Overall, I consider that the book is an intriguing perusal, with some practical knowledge into the exploration of the methods and tools of ethical hacking with Kali Linux. Good for a first read on the subject, as well as being significantly more important as a practical guide for practitioners and students of cybersecurity.

Review by Prof Emmanuel Ojo Ademola SME, FBCS
Originally published: https://www.bcs.org/content/conWebDoc...
227 reviews1 follower
February 14, 2021
Bardzo dobra. Jednak wadą książek w tytule Kali jest to, że wszystkie są bardzo podobne. W jednej być może jest mniej narzędzi opisanych, w drugiej więcej. Kierując się zakupem, proponuję patrzeć na rok wydania. Wydanie sprzed 1-2 lat, jeszcze daję rade, ale sprzed 10 już nie za bardzo. Mogą już nie być dostępne narzędzia w Kali i trzeba je samemu instalować. Ale dla hakera to nie problem ;)Ogólnie ta pozycja na rok 2021 jest dobra i jakiś czas powinna być. W sumie to już wydanie trzecie.
Profile Image for F.
93 reviews9 followers
August 24, 2019
it's contain 572 pages not as mentioned here.
explaining the basic information like the title of the book ..

This book provides a general overview of web penetration testing, its methodology, and techniques to help you identify, exploit, and remediate some of the most common vulnerabilities found in web applications.

Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.