Abstract
During the early computing era, hackers and attackers targeted operating systems and infrastructure-level components to compromise the systems. But today’s operating systems and other infrastructure components are comparatively mature in terms of security, making it hard for attackers to intrude. With increasing demand for and use of web applications, attackers are now targeting web application vulnerabilities to compromise systems. This chapter introduces common web application vulnerabilities, like SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and others, along with testing methodology and mitigations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). Web Application Hacking. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_10
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_10
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books