-
>
全国计算机等级考试最新真考题库模拟考场及详解·二级MSOffice高级应用
-
>
决战行测5000题(言语理解与表达)
-
>
软件性能测试.分析与调优实践之路
-
>
第一行代码Android
-
>
C Primer Plus 第6版 中文版
-
>
深度学习
-
>
MATLAB计算机视觉与深度学习实战-赠在线交流卡和本书源码
白帽子讲Web安全-纪念版 版权信息
- ISBN:9787121234101
- 条形码:9787121234101 ; 978-7-121-23410-1
- 装帧:一般胶版纸
- 册数:暂无
- 重量:暂无
- 所属分类:>
白帽子讲Web安全-纪念版 本书特色
互联网时代的数据安全与个人隐私受到前所未有的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?《白帽子讲web安全(纪念版)》将带你走进web安全的世界,让你了解web安全的方方面面。黑客不再神秘,攻击技术原来如此,小网站也能找到适合自己的安全道路。大公司如何做安全,为什么要选择这样的方案呢?在《白帽子讲web安全(纪念版)》中都能找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。 《白帽子讲web安全(纪念版)》根据安全宝副总裁吴翰清之前在顶级互联网公司若干年的实际工作经验而写成,在解决方案上具有极强的可操作性;深入分析诸多错误的方法及误区,对安全工作者有很好的参考价值;对安全开发流程与运营的介绍,同样具有深刻的行业指导意义。《纪念版》与前版内容相同,仅为纪念原作以多种语言在全球发行的特殊版本,请读者按需选用。
白帽子讲Web安全-纪念版 内容简介
在互联网时代,数据安全与个人隐私受到了前所未有的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?本书将带你走进Web安全的世界,让你了解Web安全的方方面面。黑客不再变得神秘,攻击技术原来我也可以会,小网站主自己也能找到正确的安全道路。大公司是怎么做安全的,为什么要选择这样的方案呢?你能在本书中找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。
白帽子讲Web安全-纪念版 目录
**篇世界观安全
第1 章 我的安全世界观...................................................................................................2
1.1 web 安全简史................................................................................................2
1.1.1 中国黑客简史........................................................................................2
1.1.2 黑客技术的发展历程..............................................................................3
1.1.3 web 安全的兴起....................................................................................5
1.2 黑帽子,白帽子.............................................................................................6
1.3 返璞归真,揭秘安全的本质..........................................................................7
1.4 破除迷信,没有银弹.....................................................................................9
1.5 安全三要素..................................................................................................10
1.6 如何实施安全评估.......................................................................................11
1.6.1 资产等级划分......................................................................................12
1.6.2 威胁分析.............................................................................................13
1.6.3 风险分析.............................................................................................14
1.6.4 设计安全方案......................................................................................15
1.7 白帽子兵法..................................................................................................16
1.7.1 secure by default 原则.........................................................................16
1.7.2 纵深防御原则......................................................................................18
1.7.3 数据与代码分离原则............................................................................19
1.7.4 不可预测性原则...................................................................................21
1.8 小结.............................................................................................................22
(附)谁来为漏洞买单?..................................................................................23
第二篇客户端脚本安全
第2 章 浏览器安全.........................................................................................................26
2.1 同源策略......................................................................................................26
2.2 浏览器沙箱..................................................................................................30
2.3 恶意网址拦截..............................................................................................33
2.4 高速发展的浏览器安全...............................................................................36
2.5 小结.............................................................................................................39
第3 章 跨站脚本攻击(xss) .....................................................................................40
3.1 xss 简介......................................................................................................40
3.2 xss 攻击进阶..............................................................................................43
3.2.1 初探xsspayload.................................................................................43
3.2.2 强大的xss payload.............................................................................46
3.2.3 xss 攻击平台.....................................................................................62
3.2.4 终极武器:xssworm..........................................................................64
3.2.5 调试javascript....................................................................................73
3.2.6 xss 构造技巧......................................................................................76
3.2.7 变废为宝:mission impossible..............................................................82
3.2.8 容易被忽视的角落:flash xss.............................................................85
3.2.9 真的高枕无忧吗:javascript 开发框架..................................................87
3.3 xss 的防御..................................................................................................89
3.3.1 四两拨千斤:httponly.........................................................................89
3.3.2 输入检查.............................................................................................93
3.3.3 输出检查.............................................................................................95
3.3.4 正确地防御xss..................................................................................99
3.3.5 处理富文本.......................................................................................102
3.3.6 防御dom basedxss.........................................................................103
3.3.7 换个角度看xss 的风险.....................................................................107
3.4 小结...........................................................................................................107
第4 章 跨站点请求伪造(csrf) ............................................................................109
4.1 csrf 简介.................................................................................................109
4.2 csrf 进阶.................................................................................................111
4.2.1 浏览器的cookie 策略........................................................................111
4.2.2 p3p 头的副作用.................................................................................113
4.2.3 get?post?......................................................................................116
4.2.4 flash csrf........................................................................................118
4.2.5 csrfworm.......................................................................................119
4.3 csrf 的防御..............................................................................................120
4.3.1 验证码..............................................................................................120
4.3.2 referercheck.....................................................................................120
4.3.3 anti csrftoken................................................................................121
4.4 小结...........................................................................................................124
第5 章 点击劫持(clickjacking).............................................................................125
5.1 什么是点击劫持.........................................................................................125
5.2 flash 点击劫持...........................................................................................127
5.3 图片覆盖攻击............................................................................................129
5.4 拖拽劫持与数据窃取.................................................................................131
5.5 clickjacking 3.0:触屏劫持.......................................................................134
5.6 防御clickjacking.......................................................................................136
5.6.1 frame busting .....................................................................................136
5.6.2 x-frame-options................................................................................137
5.7 小结...........................................................................................................138
第6 章 html 5 安全...................................................................................................139
6.1 html 5 新标签..........................................................................................139
6.1.1 新标签的xss....................................................................................139
6.1.2 iframe 的sandbox...............................................................................140
6.1.3 link types: noreferrer .........................................................................141
6.1.4 canvas 的妙用...................................................................................141
6.2 其他安全问题............................................................................................144
6.2.1 cross-origin resource sharing............................................................. 144
6.2.2 postmessage——跨窗口传递消息.........................................................146
6.2.3 web storage.......................................................................................147
6.3 小结...........................................................................................................150
第三篇服务器端应用安全
第7 章 注入攻击..........................................................................................................152
7.1 sql 注入....................................................................................................152
7.1.1 盲注(blind injection) ......................................................................153
7.1.2 timing attack....................................................................................155
7.2 数据库攻击技巧.........................................................................................157
7.2.1 常见的攻击技巧.................................................................................157
7.2.2 命令执行...........................................................................................158
7.2.3 攻击存储过程....................................................................................164
7.2.4 编码问题...........................................................................................165
7.2.5 sql column truncation...................................................................... 167
7.3 正确地防御sql 注入................................................................................170
7.3.1 使用预编译语句.................................................................................171
7.3.2 使用存储过程....................................................................................172
7.3.3 检查数据类型....................................................................................172
7.3.4 使用安全函数....................................................................................172
7.4 其他注入攻击............................................................................................173
7.4.1 xml 注入.........................................................................................173
7.4.2 代码注入...........................................................................................174
7.4.3 crlf 注入........................................................................................176
7.5 小结...........................................................................................................179
第8 章 文件上传漏洞...................................................................................................180
8.1 文件上传漏洞概述.....................................................................................180
8.1.1 从fckeditor 文件上传漏洞谈起......................................................... 181
8.1.2 绕过文件上传检查功能......................................................................182
8.2 功能还是漏洞............................................................................................183
8.2.1 apache 文件解析问题.........................................................................184
8.2.2 iis 文件解析问题...............................................................................185
8.2.3 php cgi 路径解析问题......................................................................187
8.2.4 利用上传文件钓鱼.............................................................................189
8.3 设计安全的文件上传功能..........................................................................190
8.4 小结...........................................................................................................191
第9 章 认证与会话管理...............................................................................................192
9.1 who am i? ..................................................................................................192
9.2 密码的那些事儿.........................................................................................193
9.3 多因素认证................................................................................................195
9.4 session 与认证...........................................................................................196
9.5 session fixation 攻击.................................................................................198
9.6 session 保持攻击.......................................................................................199
9.7 单点登录(sso)......................................................................................201
9.8 小结...........................................................................................................203
第10 章 访问控制........................................................................................................205
10.1 what can i do?........................................................................................205
10.2 垂直权限管理...........................................................................................208
10.3 水平权限管理...........................................................................................211
10.4 oauth 简介..............................................................................................213
10.5 小结..........................................................................................................219
第11 章 加密算法与随机数.........................................................................................220
11.1 概述..........................................................................................................220
11.2 stream cipher attack................................................................................222
11.2.1 reused key attack............................................................................222
11.2.2 bit-flipping attack............................................................................228
11.2.3 弱随机iv 问题................................................................................230
11.3 wep 破解.................................................................................................232
11.4 ecb 模式的缺陷......................................................................................236
11.5 padding oracle attack...............................................................................239
11.6 密钥管理..................................................................................................251
11.7 伪随机数问题...........................................................................................253
11.7.1 弱伪随机数的麻烦...........................................................................253
11.7.2 时间真的随机吗...............................................................................256
11.7.3 破解伪随机数算法的种子.................................................................257
11.7.4 使用安全的随机数...........................................................................265
11.8 小结..........................................................................................................265
(附)understanding md5 length extension attack.................................... 267
第12 章 web 框架安全...............................................................................................280
12.1 mvc 框架安全.........................................................................................280
12.2 模板引擎与xss 防御..............................................................................282
12.3 web 框架与csrf 防御............................................................................285
12.4 http headers 管理..................................................................................287
12.5 数据持久层与sql 注入..........................................................................288
12.6 还能想到什么...........................................................................................289
12.7 web 框架自身安全...................................................................................289
12.7.1 struts 2 命令执行漏洞.......................................................................290
12.7.2 struts 2 的问题补丁..........................................................................291
12.7.3 spring mvc 命令执行漏洞................................................................292
12.7.4 django 命令执行漏洞.......................................................................293
12.8 小结..........................................................................................................294
第13 章 应用层拒绝服务攻击.....................................................................................295
13.1 ddos 简介...............................................................................................295
13.2 应用层ddos...........................................................................................297
13.2.1 cc 攻击...........................................................................................297
13.2.2 限制请求频率..................................................................................298
13.2.3 道高一尺,魔高一丈........................................................................300
13.3 验证码的那些事儿...................................................................................301
13.4 防御应用层ddos...................................................................................304
13.5 资源耗尽攻击...........................................................................................306
13.5.1 slowloris 攻击..................................................................................306
13.5.2 http postdos..............................................................................309
13.5.3 server limitdos..............................................................................310
13.6 一个正则引发的血案:redos................................................................311
13.7 小结..........................................................................................................315
第14 章 php 安全.......................................................................................................317
14.1 文件包含漏洞...........................................................................................317
14.1.1 本地文件包含..................................................................................319
14.1.2 远程文件包含..................................................................................323
14.1.3 本地文件包含的利用技巧.................................................................323
14.2 变量覆盖漏洞...........................................................................................331
14.2.1 全局变量覆盖..................................................................................331
14.2.2 extract()变量覆盖.............................................................................334
14.2.3 遍历初始化变量...............................................................................334
14.2.4 import_request_variables 变量覆盖..................................................... 335
14.2.5 parse_str()变量覆盖..........................................................................335
14.3 代码执行漏洞...........................................................................................336
14.3.1 “危险函数”执行代码......................................................................336
14.3.2 “文件写入”执行代码......................................................................343
14.3.3 其他执行代码方式...........................................................................344
14.4 定制安全的php 环境..............................................................................348
14.5 小结..........................................................................................................352
第15 章 web server 配置安全...................................................................................353
15.1 apache 安全.............................................................................................353
15.2 nginx 安全...............................................................................................354
15.3 jboss 远程命令执行.................................................................................356
15.4 tomcat 远程命令执行..............................................................................360
15.5 http parameterpollution.........................................................................363
15.6 小结..........................................................................................................364
第四篇互联网公司安全运营
第16 章 互联网业务安全............................................................................................366
16.1 产品需要什么样的安全............................................................................366
16.1.1 互联网产品对安全的需求.................................................................367
16.1.2 什么是好的安全方案........................................................................368
16.2 业务逻辑安全...........................................................................................370
16.2.1 永远改不掉的密码...........................................................................370
16.2.2 谁是大赢家......................................................................................371
16.2.3 瞒天过海.........................................................................................372
16.2.4 关于密码取回流程...........................................................................373
16.3 账户是如何被盗的...................................................................................374
16.3.1 账户被盗的途径...............................................................................374
16.3.2 分析账户被盗的原因........................................................................376
16.4 互联网的垃圾...........................................................................................377
16.4.1 垃圾的危害......................................................................................377
16.4.2 垃圾处理.........................................................................................379
16.5 关于网络钓鱼...........................................................................................380
16.5.1 钓鱼网站简介..................................................................................381
16.5.2 邮件钓鱼.........................................................................................383
16.5.3 钓鱼网站的防控...............................................................................385
16.5.4 网购流程钓鱼..................................................................................388
16.6 用户隐私保护...........................................................................................393
16.6.1 互联网的用户隐私挑战.....................................................................393
16.6.2 如何保护用户隐私...........................................................................394
16.6.3 do-not-track...................................................................................396
16.7 小结..........................................................................................................397
(附)麻烦的终结者........................................................................................398
第17 章 安全开发流程(sdl) .................................................................................402
17.1 sdl 简介..................................................................................................402
17.2 敏捷sdl..................................................................................................406
17.3 sdl 实战经验..........................................................................................407
17.4 需求分析与设计阶段...............................................................................409
17.5 开发阶段..................................................................................................415
17.5.1 提供安全的函数...............................................................................415
17.5.2 代码安全审计工具...........................................................................417
17.6 测试阶段..................................................................................................418
17.7 小结..........................................................................................................420
第18 章 安全运营........................................................................................................422
18.1 把安全运营起来.......................................................................................422
18.2 漏洞修补流程...........................................................................................423
18.3 安全监控..................................................................................................424
18.4 入侵检测..................................................................................................425
18.5 紧急响应流程...........................................................................................428
18.6 小结..........................................................................................................430
(附)谈谈互联网企业安全的发展方向....................................................... 431
白帽子讲Web安全-纪念版 作者简介
国内著名安全组织Ph4nt0m 的创始人,精通各种攻击与防御技术。2005年加入阿里巴巴(中国)有限公司,2007年成为阿里巴巴最年轻的专家。先后完成阿里巴巴、淘宝、支付宝的安全评估与安全体系建设工作。主导了阿里巴巴的安全开发流程建设工作,在应用安全领域内有丰富的经验。现任阿里巴巴安全架构师,负责全集团WEB安全工作以及云计算安全。
- >
龙榆生:词曲概论/大家小书
龙榆生:词曲概论/大家小书
¥9.1¥24.0 - >
经典常谈
经典常谈
¥17.1¥39.8 - >
山海经
山海经
¥20.4¥68.0 - >
有舍有得是人生
有舍有得是人生
¥19.4¥45.0 - >
自卑与超越
自卑与超越
¥13.5¥39.8 - >
名家带你读鲁迅:故事新编
名家带你读鲁迅:故事新编
¥13.0¥26.0 - >
我从未如此眷恋人间
我从未如此眷恋人间
¥16.4¥49.8 - >
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
¥11.0¥23.0
-
反电信网络诈骗全民指南
¥29.3¥59.8 -
黑客攻防从入门到精通-(攻防与脚本编程篇)
¥53.1¥69 -
2022图书×抽奖盲袋
¥9.9¥25 -
2023读书月阅读盲盒——天黑,闭眼,刀谁?
¥42.3¥158 -
2022读者节纪念徽章-三星会员专属
¥45¥45.6