读书月福利
欢迎光临中图网 请 | 注册
> >
白帽子讲Web安全-纪念版

白帽子讲Web安全-纪念版

作者:吴翰清
出版社:电子工业出版社出版时间:2014-06-01
开本: 16开 页数: 432
中 图 价:¥33.8(4.9折) 定价  ¥69.0 登录后可看到会员价
暂时缺货 收藏
运费6元,满69元免运费
?快递不能达地区使用邮政小包,运费14元起
云南、广西、海南、新疆、青海、西藏六省,部分地区快递不可达
温馨提示:5折以下图书主要为出版社尾货,大部分为全新(有塑封/无塑封),个别图书品相8-9成新、切口
有划线标记、光盘等附件不全详细品相说明>>
本类五星书更多>

白帽子讲Web安全-纪念版 版权信息

  • ISBN:9787121234101
  • 条形码:9787121234101 ; 978-7-121-23410-1
  • 装帧:一般胶版纸
  • 册数:暂无
  • 重量:暂无
  • 所属分类:>

白帽子讲Web安全-纪念版 本书特色

互联网时代的数据安全与个人隐私受到前所未有的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?《白帽子讲web安全(纪念版)》将带你走进web安全的世界,让你了解web安全的方方面面。黑客不再神秘,攻击技术原来如此,小网站也能找到适合自己的安全道路。大公司如何做安全,为什么要选择这样的方案呢?在《白帽子讲web安全(纪念版)》中都能找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。 《白帽子讲web安全(纪念版)》根据安全宝副总裁吴翰清之前在顶级互联网公司若干年的实际工作经验而写成,在解决方案上具有极强的可操作性;深入分析诸多错误的方法及误区,对安全工作者有很好的参考价值;对安全开发流程与运营的介绍,同样具有深刻的行业指导意义。《纪念版》与前版内容相同,仅为纪念原作以多种语言在全球发行的特殊版本,请读者按需选用。

白帽子讲Web安全-纪念版 内容简介

在互联网时代,数据安全与个人隐私受到了前所未有的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?本书将带你走进Web安全的世界,让你了解Web安全的方方面面。黑客不再变得神秘,攻击技术原来我也可以会,小网站主自己也能找到正确的安全道路。大公司是怎么做安全的,为什么要选择这样的方案呢?你能在本书中找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。

白帽子讲Web安全-纪念版 目录

**篇世界观安全

1 章 我的安全世界观...................................................................................................2

1.1 web 安全简史................................................................................................2

1.1.1 中国黑客简史........................................................................................2

1.1.2 黑客技术的发展历程..............................................................................3

1.1.3 web 安全的兴起....................................................................................5

1.2 黑帽子,白帽子.............................................................................................6

1.3 返璞归真,揭秘安全的本质..........................................................................7

1.4 破除迷信,没有银弹.....................................................................................9

1.5 安全三要素..................................................................................................10

1.6 如何实施安全评估.......................................................................................11

1.6.1 资产等级划分......................................................................................12

1.6.2 威胁分析.............................................................................................13

1.6.3 风险分析.............................................................................................14

1.6.4 设计安全方案......................................................................................15

1.7 白帽子兵法..................................................................................................16

1.7.1 secure by default 原则.........................................................................16

1.7.2 纵深防御原则......................................................................................18

1.7.3 数据与代码分离原则............................................................................19

1.7.4 不可预测性原则...................................................................................21

1.8 小结.............................................................................................................22

(附)谁来为漏洞买单?..................................................................................23

第二篇客户端脚本安全

2 章 浏览器安全.........................................................................................................26

2.1 同源策略......................................................................................................26

2.2 浏览器沙箱..................................................................................................30

2.3 恶意网址拦截..............................................................................................33

2.4 高速发展的浏览器安全...............................................................................36

2.5 小结.............................................................................................................39

3 章 跨站脚本攻击(xss .....................................................................................40

3.1 xss 简介......................................................................................................40

3.2 xss 攻击进阶..............................................................................................43

3.2.1 初探xsspayload.................................................................................43

3.2.2 强大的xss payload.............................................................................46

3.2.3 xss 攻击平台.....................................................................................62

3.2.4 终极武器:xssworm..........................................................................64

3.2.5 调试javascript....................................................................................73

3.2.6 xss 构造技巧......................................................................................76

3.2.7 变废为宝:mission impossible..............................................................82

3.2.8 容易被忽视的角落:flash xss.............................................................85

3.2.9 真的高枕无忧吗:javascript 开发框架..................................................87

3.3 xss 的防御..................................................................................................89

3.3.1 四两拨千斤:httponly.........................................................................89

3.3.2 输入检查.............................................................................................93

3.3.3 输出检查.............................................................................................95

3.3.4 正确地防御xss..................................................................................99

3.3.5 处理富文本.......................................................................................102

3.3.6 防御dom basedxss.........................................................................103

3.3.7 换个角度看xss 的风险.....................................................................107

3.4 小结...........................................................................................................107

4 章 跨站点请求伪造(csrf ............................................................................109

4.1 csrf 简介.................................................................................................109

4.2 csrf 进阶.................................................................................................111

4.2.1 浏览器的cookie 策略........................................................................111

4.2.2 p3p 头的副作用.................................................................................113

4.2.3 get?post?......................................................................................116

4.2.4 flash csrf........................................................................................118

4.2.5 csrfworm.......................................................................................119

4.3 csrf 的防御..............................................................................................120

4.3.1 验证码..............................................................................................120

4.3.2 referercheck.....................................................................................120

4.3.3 anti csrftoken................................................................................121

4.4 小结...........................................................................................................124

5 章 点击劫持(clickjacking.............................................................................125

5.1 什么是点击劫持.........................................................................................125

5.2 flash 点击劫持...........................................................................................127

5.3 图片覆盖攻击............................................................................................129

5.4 拖拽劫持与数据窃取.................................................................................131

5.5 clickjacking 3.0:触屏劫持.......................................................................134

5.6 防御clickjacking.......................................................................................136

5.6.1 frame busting .....................................................................................136

5.6.2 x-frame-options................................................................................137

5.7 小结...........................................................................................................138

6 html 5 安全...................................................................................................139

6.1 html 5 新标签..........................................................................................139

6.1.1 新标签的xss....................................................................................139

6.1.2 iframe sandbox...............................................................................140

6.1.3 link types: noreferrer .........................................................................141

6.1.4 canvas 的妙用...................................................................................141

6.2 其他安全问题............................................................................................144

6.2.1 cross-origin resource sharing............................................................. 144

6.2.2 postmessage——跨窗口传递消息.........................................................146

6.2.3 web storage.......................................................................................147

6.3 小结...........................................................................................................150

第三篇服务器端应用安全

7 章 注入攻击..........................................................................................................152

7.1 sql 注入....................................................................................................152

7.1.1 盲注(blind injection ......................................................................153

7.1.2 timing attack....................................................................................155

7.2 数据库攻击技巧.........................................................................................157

7.2.1 常见的攻击技巧.................................................................................157

7.2.2 命令执行...........................................................................................158

7.2.3 攻击存储过程....................................................................................164

7.2.4 编码问题...........................................................................................165

7.2.5 sql column truncation...................................................................... 167

7.3 正确地防御sql 注入................................................................................170

7.3.1 使用预编译语句.................................................................................171

7.3.2 使用存储过程....................................................................................172

7.3.3 检查数据类型....................................................................................172

7.3.4 使用安全函数....................................................................................172

7.4 其他注入攻击............................................................................................173

7.4.1 xml 注入.........................................................................................173

7.4.2 代码注入...........................................................................................174

7.4.3 crlf 注入........................................................................................176

7.5 小结...........................................................................................................179

8 章 文件上传漏洞...................................................................................................180

8.1 文件上传漏洞概述.....................................................................................180

8.1.1 fckeditor 文件上传漏洞谈起......................................................... 181

8.1.2 绕过文件上传检查功能......................................................................182

8.2 功能还是漏洞............................................................................................183

8.2.1 apache 文件解析问题.........................................................................184

8.2.2 iis 文件解析问题...............................................................................185

8.2.3 php cgi 路径解析问题......................................................................187

8.2.4 利用上传文件钓鱼.............................................................................189

8.3 设计安全的文件上传功能..........................................................................190

8.4 小结...........................................................................................................191

9 章 认证与会话管理...............................................................................................192

9.1 who am i? ..................................................................................................192

9.2 密码的那些事儿.........................................................................................193

9.3 多因素认证................................................................................................195

9.4 session 与认证...........................................................................................196

9.5 session fixation 攻击.................................................................................198

9.6 session 保持攻击.......................................................................................199

9.7 单点登录(sso......................................................................................201

9.8 小结...........................................................................................................203

10 章 访问控制........................................................................................................205

10.1 what can i do?........................................................................................205

10.2 垂直权限管理...........................................................................................208

10.3 水平权限管理...........................................................................................211

10.4 oauth 简介..............................................................................................213

10.5 小结..........................................................................................................219

11 章 加密算法与随机数.........................................................................................220

11.1 概述..........................................................................................................220

11.2 stream cipher attack................................................................................222

11.2.1 reused key attack............................................................................222

11.2.2 bit-flipping attack............................................................................228

11.2.3 弱随机iv 问题................................................................................230

11.3 wep 破解.................................................................................................232

11.4 ecb 模式的缺陷......................................................................................236

11.5 padding oracle attack...............................................................................239

11.6 密钥管理..................................................................................................251

11.7 伪随机数问题...........................................................................................253

11.7.1 弱伪随机数的麻烦...........................................................................253

11.7.2 时间真的随机吗...............................................................................256

11.7.3 破解伪随机数算法的种子.................................................................257

11.7.4 使用安全的随机数...........................................................................265

11.8 小结..........................................................................................................265

(附)understanding md5 length extension attack.................................... 267

12 web 框架安全...............................................................................................280

12.1 mvc 框架安全.........................................................................................280

12.2 模板引擎与xss 防御..............................................................................282

12.3 web 框架与csrf 防御............................................................................285

12.4 http headers 管理..................................................................................287

12.5 数据持久层与sql 注入..........................................................................288

12.6 还能想到什么...........................................................................................289

12.7 web 框架自身安全...................................................................................289

12.7.1 struts 2 命令执行漏洞.......................................................................290

12.7.2 struts 2 的问题补丁..........................................................................291

12.7.3 spring mvc 命令执行漏洞................................................................292

12.7.4 django 命令执行漏洞.......................................................................293

12.8 小结..........................................................................................................294

13 章 应用层拒绝服务攻击.....................................................................................295

13.1 ddos 简介...............................................................................................295

13.2 应用层ddos...........................................................................................297

13.2.1 cc 攻击...........................................................................................297

13.2.2 限制请求频率..................................................................................298

13.2.3 道高一尺,魔高一丈........................................................................300

13.3 验证码的那些事儿...................................................................................301

13.4 防御应用层ddos...................................................................................304

13.5 资源耗尽攻击...........................................................................................306

13.5.1 slowloris 攻击..................................................................................306

13.5.2 http postdos..............................................................................309

13.5.3 server limitdos..............................................................................310

13.6 一个正则引发的血案:redos................................................................311

13.7 小结..........................................................................................................315

14 php 安全.......................................................................................................317

14.1 文件包含漏洞...........................................................................................317

14.1.1 本地文件包含..................................................................................319

14.1.2 远程文件包含..................................................................................323

14.1.3 本地文件包含的利用技巧.................................................................323

14.2 变量覆盖漏洞...........................................................................................331

14.2.1 全局变量覆盖..................................................................................331

14.2.2 extract()变量覆盖.............................................................................334

14.2.3 遍历初始化变量...............................................................................334

14.2.4 import_request_variables 变量覆盖..................................................... 335

14.2.5 parse_str()变量覆盖..........................................................................335

14.3 代码执行漏洞...........................................................................................336

14.3.1 “危险函数”执行代码......................................................................336

14.3.2 “文件写入”执行代码......................................................................343

14.3.3 其他执行代码方式...........................................................................344

14.4 定制安全的php 环境..............................................................................348

14.5 小结..........................................................................................................352

15 web server 配置安全...................................................................................353

15.1 apache 安全.............................................................................................353

15.2 nginx 安全...............................................................................................354

15.3 jboss 远程命令执行.................................................................................356

15.4 tomcat 远程命令执行..............................................................................360

15.5 http parameterpollution.........................................................................363

15.6 小结..........................................................................................................364

第四篇互联网公司安全运营

16 章 互联网业务安全............................................................................................366

16.1 产品需要什么样的安全............................................................................366

16.1.1 互联网产品对安全的需求.................................................................367

16.1.2 什么是好的安全方案........................................................................368

16.2 业务逻辑安全...........................................................................................370

16.2.1 永远改不掉的密码...........................................................................370

16.2.2 谁是大赢家......................................................................................371

16.2.3 瞒天过海.........................................................................................372

16.2.4 关于密码取回流程...........................................................................373

16.3 账户是如何被盗的...................................................................................374

16.3.1 账户被盗的途径...............................................................................374

16.3.2 分析账户被盗的原因........................................................................376

16.4 互联网的垃圾...........................................................................................377

16.4.1 垃圾的危害......................................................................................377

16.4.2 垃圾处理.........................................................................................379

16.5 关于网络钓鱼...........................................................................................380

16.5.1 钓鱼网站简介..................................................................................381

16.5.2 邮件钓鱼.........................................................................................383

16.5.3 钓鱼网站的防控...............................................................................385

16.5.4 网购流程钓鱼..................................................................................388

16.6 用户隐私保护...........................................................................................393

16.6.1 互联网的用户隐私挑战.....................................................................393

16.6.2 如何保护用户隐私...........................................................................394

16.6.3 do-not-track...................................................................................396

16.7 小结..........................................................................................................397

(附)麻烦的终结者........................................................................................398

17 章 安全开发流程(sdl .................................................................................402

17.1 sdl 简介..................................................................................................402

17.2 敏捷sdl..................................................................................................406

17.3 sdl 实战经验..........................................................................................407

17.4 需求分析与设计阶段...............................................................................409

17.5 开发阶段..................................................................................................415

17.5.1 提供安全的函数...............................................................................415

17.5.2 代码安全审计工具...........................................................................417

17.6 测试阶段..................................................................................................418

17.7 小结..........................................................................................................420

18 章 安全运营........................................................................................................422

18.1 把安全运营起来.......................................................................................422

18.2 漏洞修补流程...........................................................................................423

18.3 安全监控..................................................................................................424

18.4 入侵检测..................................................................................................425

18.5 紧急响应流程...........................................................................................428

18.6 小结..........................................................................................................430

(附)谈谈互联网企业安全的发展方向....................................................... 431

展开全部

白帽子讲Web安全-纪念版 作者简介

国内著名安全组织Ph4nt0m 的创始人,精通各种攻击与防御技术。2005年加入阿里巴巴(中国)有限公司,2007年成为阿里巴巴最年轻的专家。先后完成阿里巴巴、淘宝、支付宝的安全评估与安全体系建设工作。主导了阿里巴巴的安全开发流程建设工作,在应用安全领域内有丰富的经验。现任阿里巴巴安全架构师,负责全集团WEB安全工作以及云计算安全。

商品评论(0条)
暂无评论……
书友推荐
编辑推荐
返回顶部
中图网
在线客服