logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Web Penetration Testing with Kali Linux, 2nd Edition: Build your defense against web attacks with Kali Linux 2.0 by Juned Ahmed Ansari ISBN 9781783988525, 1783988525

  • SKU: EBN-5469686
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Web Penetration Testing with Kali Linux, 2nd Edition: Build your defense against web attacks with Kali Linux 2.0 after payment.
Authors:Juned Ahmed Ansari
Pages:312 pages.
Year:2015
Publisher:Packt Publishing
Language:english
File Size:11.56 MB
Format:pdf
ISBNS:9781783988525, 1783988525
Categories: Ebooks

Product desciption

(Ebook) Web Penetration Testing with Kali Linux, 2nd Edition: Build your defense against web attacks with Kali Linux 2.0 by Juned Ahmed Ansari ISBN 9781783988525, 1783988525

Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products