Software Vulnerabilities Exposed
An exploration of Web 2.0 hacking methods, this book discusses how to enhance next-generation security controls for better application security. It covers old vulnerabilities and threat vectors such as phishing, cross-site scripting (XSS), cross-site request forgery (CSRF) exploitation, viruses and malware, and denial of service. It introduces Web 2.0 scanning and vulnerability detection methods; Ajax and Flash hacking methods; SOAP, REST, and XML-RPC hacking; RSS/Atom feed attacks; fuzzing and code review methodologies and tools, and puts these in the content of Web 2.0 and mobile applications. The book includes exercises and suggestions for further reading.