Web Application Vulnerabilities

Detect, Exploit, Prevent


  • Steven Palmer, Member of the FBI's Infragard Organization and Penetration Tester of Critical Federal Network Infrastructure

In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
View full description


This book is written for designers, developers, and testers of Web-based applications. These readers are intermediate to advanced and have working knowledge of all common programming languages used for developing Web-based applications including Java, JavaScript, AJAX, ColdFusion, Perl, ActiveX, and the various .net languages.


Book information

  • Published: December 2007
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-209-6

Table of Contents

Chapter 1: IntroductionChapter 2: Information Gathering TechniquesChapter 3: Common Input Validation VulnerabilitiesChapter 4: Application Logic Flaws and Common Coding IssuesChapter 5: Common Client Trust IssuesChapter 6: Server Side Validation Vulnerabilities in a Multi User Multi Role EnvironmentChapter 7: Session Management VulnerabilitiesChapter 8: PhishingChapter 9: Client Side SecurityChapter 10: Same Issues / New TechnologiesChapter 11: Other Security Considerations