000 01351nam a22001817a 4500
007 ta
008 240321b |||||||| |||| 00| 0 eng d
020 _a9789355512154
040 _cZET-ke
050 _aQA76.3
_b.R35 2022
100 _aRakshit, Samir Kumar
245 _aEthical hacker's penetration testing guide:
_bVulnerability assessment and attack simulation on web, mobile, network services and wireless networks/
_cby Samir Kumar Rakshit
260 _aIndia:
_bBPB publications,
_cc2022
300 _axxiii, 448p.:
_bill,
_c23cm
500 _aincl. index
505 _aOverviwe of web and related technologies and understanding the application -- Web penetration testing through code review -- Web penetration testing-injection attacks-- Fuzzing, dynamic scanning of REST API and web application -- Web penetration testing-and validated redirects/fowards, SSRF -- Pen testing for authentication, authorization byapass and business logic flows -- Pentesting for senstive data, vulnerable components, security monitoring -- Exploiting file upload functionality and XXE attack -- Web penetration testing: Thick client -- Introduction to network pentesting -- Introduction to wireless pentesting -- Penetration testing-Mobile app -- Security automation for web pentaste -- Setting up pentest lab
942 _2lcc
_cBK
_hQA76.3
_kQA76.3
_m.R35 2022
999 _c6002
_d6002