Читать книгу Web Penetration Testing - Radhi Shatob - Страница 2
Who is this Book for?
ОглавлениеThis book is a hands-on guide, it is for anyone interested in Websites security and wanted to know how hackers hack websites, what tool they use and how they do information gathering about their target. This book is aimed at people who are new to the world of ethical hacking and penetration testing. It is for those with little or no previous experience. However, this book is also good for Information Security Managers and Information Technology managers in general who want to understand what the threats to their systems and websites are when is exposed to the internet , what tools hackers use and what measures they need to take in order to protect their systems and networks.
This book contains step-by-step guide to 32 Web Penetration tests that are tested in the latest Kali Linux version 2020.1. It includes clear screen shots and easy to follow steps to most of Websites hacking techniques such as Website information gathering, DNS hijacking attacks, HTTP and HTTPS intercepting and decrypting, Cross Site Scripting XSS . SQL injection and more.
The Book can be used as a reference guide to Websites and Web applications penetration testers
Book Primary audience:
People who are interested in web applications security.
Website Penetration testers.
Websites administrators.
Information security analysts.
Website Developers.
Information Security managers.
Information Technology managers.
White Hat ethical hacker Ethics
This book teaches you to be a penetration tester in other word a white hat ethical hacker. The exercises listed in this book can be very harmful and illegal to do in real environment without prior permission to conduct such activities against any information system, Website, network or normal client who use computing devices.
Don’t be malicious.
Don’t use skills learned in illegal activities.
If you are doing Penetration testing for external Client, keep all data gathered during the penetration testing confidential and don’t not reveal the Data to anyone without the consent of the client.
Don’t use computer to harm or interfere with other people’s work.
Neither the author of this book, nor the publisher encourage the misuse of the penetration testing exercises listed in this book.