19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction xxxiii<br />

That said, you will find several tools useful, and sometimes indispensable,<br />

when performing <strong>the</strong> tasks and techniques we describe. All of <strong>the</strong>se are available<br />

on <strong>the</strong> Internet. We recommend that you download and experiment with<br />

each tool as you read about it.<br />

What’s on <strong>the</strong> Website<br />

The companion <strong>web</strong>site for this book at http://mdsec.net/wahh, which you can<br />

also link to from www/wiley.com/go/<strong>web</strong>hacker2e, contains several resources<br />

that you will find useful in <strong>the</strong> course of mastering <strong>the</strong> techniques we describe<br />

and using <strong>the</strong>m to attack actual <strong>application</strong>s. In particular, <strong>the</strong> <strong>web</strong>site contains<br />

access to <strong>the</strong> following:<br />

n Source code for some of <strong>the</strong> scripts we present in <strong>the</strong> book<br />

n A list of current links to all <strong>the</strong> tools and o<strong>the</strong>r resources discussed in<br />

<strong>the</strong> book<br />

n A handy checklist of <strong>the</strong> tasks involved in attacking a typical <strong>application</strong><br />

n Answers to <strong>the</strong> questions posed at <strong>the</strong> end of each chapter<br />

n Hundreds of interactive vulnerability labs that are used in examples<br />

throughout this book and that are available on a subscription basis to<br />

help you develop and refine your skills<br />

Bring It On<br />

Web <strong>application</strong> security remains a fun and thriving subject. We enjoyed writing<br />

this book as much as we continue to enjoy hacking into <strong>web</strong> <strong>application</strong>s<br />

on a daily basis. We hope that you will also take pleasure from learning about<br />

<strong>the</strong> different techniques we describe and how you can defend against <strong>the</strong>m.<br />

Before going any fur<strong>the</strong>r, we should mention an important caveat. In most<br />

countries, attacking computer systems without <strong>the</strong> owner’s permission is against<br />

<strong>the</strong> law. The majority of <strong>the</strong> techniques we describe are illegal if carried out<br />

without consent.<br />

The authors are professional penetration testers who routinely attack <strong>web</strong><br />

<strong>application</strong>s on behalf of clients to help <strong>the</strong>m improve <strong>the</strong>ir security. In recent<br />

years, numerous security professionals and o<strong>the</strong>rs have acquired criminal<br />

records — and ended <strong>the</strong>ir careers — by experimenting on or actively attacking<br />

computer systems without permission. We urge you to use <strong>the</strong> information<br />

contained in this book only for lawful purposes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!