Jun 192013
 

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You’ll explore the various new technologies employed

List Price: $ 50.00

Price: $ 25.90

Related Security Products

  3 Responses to “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws”

  1. 34 of 34 people found the following review helpful
    5.0 out of 5 stars
    The Book That Keeps on Giving…, October 14, 2011
    By 

    Amazon Verified Purchase(What’s this?)
    This review is from: The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws (Paperback)

    There’s a running joke we have on our assessment team about the Web Application Hackers Handbook. Every time we see a new technology, or have to deal with a one-off situation, we start doing research online only to find it was already referenced in WAHH somewhere. We’ve all read this book several times too, it’s like Dafydd and Marcus sneak into our houses at night and add content…

    Joking aside though, there is no other reference for web hacking as thorough or complete as WAHH.

    With WAHH2 the authors added a significant amount content and rehashed existing chapters that were already deeply technical. The bonus in WAHH2 is its associated labs. Dafydd and Marcus have been giving a live WAHH training for years and have now moved the stellar CTF like challenges to the cloud. You can buy credits ($7 for 1hr) and move right along as you read the book (MDSec.net). When I say the labs are stellar, I mean it. The labs come almost straight from the class and start trivial and then get crazy. The injection labs were by far my favorite, housing 30-40 different injection types/variants each between XSS/SQLi. The CTF in the class (which i’ll mention again is where the MDSec.com labs are based from) gets ridiculous toward the end. Even seasoned web testers fall around questions 14-16. But i digress…

    WAHH2 is now the defacto buy for any pentest/QA/Audit team. Its usage will surpass any other book on your bookshelf if you are doing practical testing.

    5 stars, i’d give it 10 if I could.

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

  2. 18 of 18 people found the following review helpful
    5.0 out of 5 stars
    An Improvement on the Best, October 1, 2011
    By 
    Daniel Miessler “grep understanding” (San Francisco, California) –
    (REAL NAME)
      

    Amazon Verified Purchase(What’s this?)
    This review is from: The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws (Paperback)

    This book improves on what I already thought was the best book on the subject.

    The advantage of this book (and now the new version even more so) is in the way it breaks down the topics. Many books sort of jump around with their various sections, while the WAHH takes the precise line that I think is best when building on one’s understanding of this topic.

    The updated material is significant, and definitely worth the re-purchase. I bought both the dead-tree and the Kindle version.

    100% definitely recommended.

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

  3. 14 of 15 people found the following review helpful
    2.0 out of 5 stars
    Web Application Hacker’s Handbook 2nd ed., August 16, 2012
    Amazon Verified Purchase(What’s this?)
    This review is from: The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws (Paperback)

    The first 3 chapters are a very good review of the state of Internet security in general. Then you hit chapter 4 and everything becomes C.I.P.U. (clear if previously understood) in a hurry. What is “Burp” and why do I need it? You have to jump to chapter 20 to find out, where you are told how to set up a proxy server. So now what? Use Burp to figure things out! We’re going in a circle here. (And this assumes you’ve got your proxy even working.)

    The book also stresses on-line learning thru their website, for a modest fee. But just what do you get for these lessons. I don’t know, because the first one doesn’t occur until chapter 5. And by then I was turned off by the book.

    To be fair, there’s a gold mine of material in this book. But it’s not for the beginner. You have to put it together like a jig saw puzzle, but without benefit of any picture of what the finished puzzle should look like.

    If you are already beyond basic hacking, are aware of the tools available, and know the HTML standard inside out, then this is probably a good book for you. But it is way too much for the newbie. This book should come with the skill level notice of “For intermediate to advanced users.”

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

 Leave a Reply

(required)

(required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>