Welcome to Cheap2Price

    Modern Web Penetration Testing 2016


    Product details:

    • Product Format: PDF Format
    • Publisher ‏ : ‎ Packet Publishing; 1st edition (October 28, 2016)
    • Publication date ‏ : ‎ October 28, 2016
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 15,589 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 298 pages
    • Lending ‏ : ‎ Not Enabled

    Key Features

    • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today’s web applications
    • Penetrate and secure your web application using various techniques
    • Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers

    Book Description

    Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.

    We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.

    We’ll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.

    Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.

    This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

    What you will learn

    • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
    • Work with different security tools to automate most of the redundant tasks
    • See different kinds of newly-designed security headers and how they help to provide security
    • Exploit and detect different kinds of XSS vulnerabilities
    • Protect your web application using filtering mechanisms
    • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
    • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
    • Get to know how to test REST APIs to discover security issues in them

    About the Author

    Prakhar Prasad is a web application security researcher and penetration tester from India. He has been a successful participant in various bug bounty programs and has discovered security flaws on websites such as Google, Facebook, Twitter, PayPal, Slack, and many more. He secured the tenth position worldwide in the year 2014 at HackerOne’s platform. He is OSCP and OSWP certified, which are some of the most widely respected certifications in the information security industry. He occasionally performs training and security assessment for various government, non-government, and educational organizations.

    Table of Contents

    1. Common Security Protocols
    2. Information Gathering
    3. Cross-Site Scripting
    4. Cross-Site Request Forgery
    5. Exploiting SQL Injection
    6. File Upload Vulnerabilities
    7. Metasploit and Web
    8. XML Attacks
    9. Emerging Attack Vectors
    10. OAuth 2.0 Security
    11. API Testing Methodology


    There are no reviews yet.

    Only logged in customers who have purchased this product may leave a review.

    Vendor Information

    • Sale!
      Rated 0 out of 5

      Penetration Testing Essentials 2017


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Sybex; 1st edition (November 15, 2016)
      • Publication date ‏ : ‎ November 15, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 3,006 KB
      • Page: 287
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled

      Your pen testing career begins here, with a solid foundation in essential skills and concepts

      Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you’ll use to discover the weak spots before others do. You’ll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You’ll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications.

      IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.

      • Learn the fundamentals of security and cryptography
      • Master breaking, entering, and maintaining access to a system
      • Escape and evade detection while covering your tracks
      • Build your pen testing lab and the essential toolbox

      Start developing the tools and mindset you need to become experienced in pen testing today.

      Add to cart
    • Sale! Ten Fit Jewelry 3 Carat VVS1 Simulated Diamond Engagement Ring for Women Silver Wedding Jewelry
      Rated 0 out of 5

      Ten Fit Jewelry 3 Carat VVS1 Simulated Diamond Engagement Ring for Women Silver Wedding Jewelry


      Product specifications

      Jewelry Information:

      Brand, Seller, or Collection Name Ten Fit
      Metal stamp 0.925
      Metal Platinum-plated
      Material gemstone
      Gem Type Created Diamond
      Setting Prong
      Length 5 millimeters
      Ring size 4.5
      Resizable No
      Model number R106-4.5

      Created Diamond Information:

      Stone shape Square
      Minimum color clear
      Cut 3 ex Antwerp Cut
      Stone Creation Method Simulated
      Add to cart
    • Sale!
      Rated 0 out of 5

      Vollare Intensive Fairness Whitening Night Cream -Visibly Brightens & Evens Skin Tone – 50ml

      Skin Type
      All Types of Skin
      Solution Type
      Brightening / Glowing
      Brand Name
      Vollare Cosmetics
      Vollare Cosmetics
      Add to cart
    • Sale!
      Rated 0 out of 5

      Spy Camera Pen 32GB Memory


      Product Description

      • 1) Digital Camera Pen works as a 32GB USB drive.
      • 2) Dimensions: 15cm x 1.5cm x 1.5cm (L x W x Diameter).
      • 3) Digital Camera Pen Camcorder bolsters USB 2.0 and 1.0.
      • 4) Real time recording in AVI video organize.
      • 5) The 2GB Digital Camera Pen will catch an aggregate of around 2 to 3 hours of video.
      • 6) USB Plug and Play Compatible.
      • 7) Video record measure: > 500KB for every min.
      • 8) Built-in rechargeable lithium-particle battery.
      • 9) Adaptor sort: USB connector charging link.
      • 10) You can utilize the Digital Camera Pen as a voice recorder.
      • 11) The Digital Camera Pen contains the littlest stick gap camera influenced particularly for secret to utilize.
      • 12) Digital Camera Pen has a simple to utilize “one touch record” catch enabling you to record any confirmation momentarily.
      • Particulars: Item Parameters
      • Video Format :AVI
      • Video Encoding : M-JPEG
      • Video Resolution : 1280*960 VGA
      • Video Frame Rate : 30fps±1fps
      • Supporting System : Windows me/2000/xp/2003/vista, WIN7
      • Charging Voltage : DC-5V
      • Interface Type : Mini USB
      • Battery Type : High-limit lithium polymer
      • Bundle: 1X Spy Pen camera Recorder and 1X USB link
      Add to cart
    • Sale!
      Rated 0 out of 5



      Item specifics

      New with box: A brand-new, unused, and unworn item (including handmade items) in the original packaging (such as the original box or bag) and/or with the original tags attached.
      Brand: Technic
      Skin Type: All Skin Types MPN: 28724
      Size: Standard Manufacturer Part Number: 28724
      Coverage: Full Type: Foundation
      Period After Opening (PAO): 6M Formulation: Liquid
      Features: Cruelty-free/No Animal Testing, Fair Trade, Long Lasting Volume: 35ml
      Country/Region of Manufacture: United Kingdom Effect: Satin
      Add to cart
    • Sale!
      Rated 0 out of 5

      Computer Security Fundamentals


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Pearson IT Certification; 3rd edition (June 28, 2016)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 447 pages


      Clearly explains core concepts, terminology, challenges, technologies, and skills

      Covers today&;s latest attacks and countermeasures

      The perfect beginner&;s guide for anyone interested in a computer security career

      Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

      Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

      This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.

      Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.

      Learn how to

      ·         Identify and prioritize potential threats to your network

      ·         Use basic networking knowledge to improve security

      ·         Get inside the minds of hackers, so you can deter their attacks

      ·         Implement a proven layered approach to network security

      ·         Resist modern social engineering attacks

      ·         Defend against today&;s most common Denial of Service (DoS) attacks

      ·         Halt viruses, spyware, worms, Trojans, and other malware

      ·         Prevent problems arising from malfeasance or ignorance

      ·         Choose the best encryption methods for your organization

      ·         Compare security technologies, including the latest security appliances

      ·         Implement security policies that will work in your environment

      ·         Scan your network for vulnerabilities

      ·         Evaluate potential security consultants

      ·         Master basic computer forensics and know what to do if you&;re attacked

      ·         Learn how cyberterrorism and information warfare are evolving


      Add to cart
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Wishlist 0
    Open wishlist page Continue shopping