In this chapter, we have explored some of the most common web application vulnerabilities plaguing cyber security. Attacks such as SQL injection, XSS, and username enumeration continue to be popular attack vectors for hackers to use. This chapter also provided two informative labs demonstrating Autopwn2 and BeEF. By completing the labs, you now have applied knowledge on how to use web app penetration tools to find vulnerabilities. The labs also showed how hackers may use the tools for recon and social engineering attacks. Towards the end of the chapter, we discussed different types of defenses that can be deployed against web application attacks. After reading this chapter, the user should have a much better understanding of what kind of vulnerabilities can be found in web apps and how to use the tools to fix the exploits found. Having this kind of knowledge will help the user increase their cyber security...
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine