0 0 0

白帽子讲Web安全(纪念版).epub

我三分钟热度却爱你好深
1月前 500
我用夸克网盘分享了「白帽子讲Web安全(纪念版).epub」,点击链接即可保存。打开「夸克APP」在线查看,支持多种文档格式转换。
白帽子讲Web安全(纪念版) 作者: 吴翰清 出版社: 电子工业出版社 出版年: 2014-6 页数: 448 定价: 69.00元 装帧: 平装 ISBN: 9787121234101

内容简介

互联网时代的数据安全与个人隐私受到前所未有的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?《白帽子讲Web 安全(纪念版)》将带你走进Web 安全的世界,让你了解Web 安全的方方面面。黑客不再神秘,攻击技术原来如此,小网站也能找到适合自己的安全道路。大公司如何做安全,为什么要选择这样的方案呢?在《白帽子讲Web 安全(纪念版)》中都能找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。 《白帽子讲Web 安全(纪念版)》根据安全宝副总裁吴翰清之前在顶级互联网公司若干年的实际工作经验而写成,在解决方案上具有极强的可操作性;深入分析诸多错误的方法及误区,对安全工作者有很好的参考价值;对安全开发流程与运营的介绍,同样具有深刻的行业指导意义。《纪念版》与前版内容相同,仅为纪念原作以多种语言在全球发行的特殊版本,请读者按需选用。

作者简介

吴翰清,毕业于西安交通大学少年班,从2000年开始研究网络攻防技术。在大学期间创立了在中国安全圈内极具影响力的组织“幻影”。

网友热评

俺不轻易写评论: 之前看的书算脚本小子、这个才是真正的黑客是另一层次上的,就是书有点老了、里面的有些知识点难免过时了 大黄: 内容挺好,不过跟2012版一模一样的,“纪念版”从何而来? _浮生若梦: 没有先验知识体验很差 知识没有成一个体系 太碎片化了 是我: 1. 整体上干货不算多,通篇注重规范的讲解; 2. 能比较系统地认识安全在程序设计中的重要性; 3. 很多规则,在百度实习时有亲身体会,所以看完本书后惊喜度不高; 素面蒙纱: 讲的点比较多,一遍粗读,尤其是遇到代码部分就直接跳过,吸收度很低。需要后续继续深读

图书目录

第一篇世界观安全 第1章我的安全世界观...................................................................................................2 1.1Web安全简史................................................................................................2 1.1.1中国黑客简史........................................................................................2 1.1.2黑客技术的发展历程..............................................................................3 1.1.3Web安全的兴起....................................................................................5 1.2黑帽子,白帽子.............................................................................................6 1.3返璞归真,揭秘安全的本质..........................................................................7 1.4破除迷信,没有银弹.....................................................................................9 1.5安全三要素..................................................................................................10 1.6如何实施安全评估.......................................................................................11 1.6.1资产等级划分......................................................................................12 1.6.2威胁分析.............................................................................................13 1.6.3风险分析.............................................................................................14 1.6.4设计安全方案......................................................................................15 1.7白帽子兵法..................................................................................................16 1.7.1SecureByDefault原则.........................................................................16 1.7.2纵深防御原则......................................................................................18 1.7.3数据与代码分离原则............................................................................19 1.7.4不可预测性原则...................................................................................21 1.8小结.............................................................................................................22 (附)谁来为漏洞买单?..................................................................................23 第二篇客户端脚本安全 第2章浏览器安全.........................................................................................................26 2.1同源策略......................................................................................................26 2.2浏览器沙箱..................................................................................................30 2.3恶意网址拦截..............................................................................................33 2.4高速发展的浏览器安全...............................................................................36 2.5小结.............................................................................................................39 第3章跨站脚本攻击(XSS).....................................................................................40 3.1XSS简介......................................................................................................40 3.2XSS攻击进阶..............................................................................................43 3.2.1初探XSSPayload.................................................................................43 3.2.2强大的XSSPayload.............................................................................46 3.2.3XSS攻击平台.....................................................................................62 3.2.4终极武器:XSSWorm..........................................................................64 3.2.5调试JavaScript....................................................................................73 3.2.6XSS构造技巧......................................................................................76 3.2.7变废为宝:MissionImpossible..............................................................82 3.2.8容易被忽视的角落:FlashXSS.............................................................85 3.2.9真的高枕无忧吗:JavaScript开发框架..................................................87 3.3XSS的防御..................................................................................................89 3.3.1四两拨千斤:HttpOnly.........................................................................89 3.3.2输入检查.............................................................................................93 3.3.3输出检查.............................................................................................95 3.3.4正确地防御XSS..................................................................................99 3.3.5处理富文本.......................................................................................102 3.3.6防御DOMBasedXSS.........................................................................103 3.3.7换个角度看XSS的风险.....................................................................107 3.4小结...........................................................................................................107 第4章跨站点请求伪造(CSRF)............................................................................109 4.1CSRF简介.................................................................................................109 4.2CSRF进阶.................................................................................................111 4.2.1浏览器的Cookie策略........................................................................111 4.2.2P3P头的副作用.................................................................................113 4.2.3GET?POST?......................................................................................116 4.2.4FlashCSRF........................................................................................118 4.2.5CSRFWorm.......................................................................................119 4.3CSRF的防御..............................................................................................120 4.3.1验证码..............................................................................................120 4.3.2RefererCheck.....................................................................................120 4.3.3AntiCSRFToken................................................................................121 4.4小结...........................................................................................................124 第5章点击劫持(ClickJacking).............................................................................125 5.1什么是点击劫持.........................................................................................125 5.2Flash点击劫持...........................................................................................127 5.3图片覆盖攻击............................................................................................129 5.4拖拽劫持与数据窃取.................................................................................131 5.5ClickJacking3.0:触屏劫持.......................................................................134 5.6防御ClickJacking.......................................................................................136 5.6.1framebusting.....................................................................................136 5.6.2X-Frame-Options................................................................................137 5.7小结...........................................................................................................138 第6章HTML5安全...................................................................................................139 6.1HTML5新标签..........................................................................................139 6.1.1新标签的XSS....................................................................................139 6.1.2iframe的sandbox...............................................................................140 6.1.3LinkTypes:noreferrer.........................................................................141 6.1.4Canvas的妙用...................................................................................141 6.2其他安全问题............................................................................................144 6.2.1Cross-OriginResourceSharing.............................................................144 6.2.2postMessage——跨窗口传递消息.........................................................146 6.2.3WebStorage.......................................................................................147 6.3小结...........................................................................................................150 第三篇服务器端应用安全 第7章注入攻击..........................................................................................................152 7.1SQL注入....................................................................................................152 7.1.1盲注(BlindInjection)......................................................................153 7.1.2TimingAttack....................................................................................155 7.2数据库攻击技巧.........................................................................................157 7.2.1常见的攻击技巧.................................................................................157 7.2.2命令执行...........................................................................................158 7.2.3攻击存储过程....................................................................................164 7.2.4编码问题...........................................................................................165 7.2.5SQLColumnTruncation......................................................................167 7.3正确地防御SQL注入................................................................................170 7.3.1使用预编译语句.................................................................................171 7.3.2使用存储过程....................................................................................172 7.3.3检查数据类型....................................................................................172 7.3.4使用安全函数....................................................................................172 7.4其他注入攻击............................................................................................173 7.4.1XML注入.........................................................................................173 7.4.2代码注入...........................................................................................174 7.4.3CRLF注入........................................................................................176 7.5小结...........................................................................................................179 第8章文件上传漏洞...................................................................................................180 8.1文件上传漏洞概述.....................................................................................180 8.1.1从FCKEditor文件上传漏洞谈起.........................................................181 8.1.2绕过文件上传检查功能......................................................................182 8.2功能还是漏洞............................................................................................183 8.2.1Apache文件解析问题.........................................................................184 8.2.2IIS文件解析问题...............................................................................185 8.2.3PHPCGI路径解析问题......................................................................187 8.2.4利用上传文件钓鱼.............................................................................189 8.3设计安全的文件上传功能..........................................................................190 8.4小结...........................................................................................................191 第9章认证与会话管理...............................................................................................192 9.1WhoamI?..................................................................................................192 9.2密码的那些事儿.........................................................................................193 9.3多因素认证................................................................................................195 9.4Session与认证...........................................................................................196 9.5SessionFixation攻击.................................................................................198 9.6Session保持攻击.......................................................................................199 9.7单点登录(SSO)......................................................................................201 9.8小结...........................................................................................................203 第10章访问控制........................................................................................................205 10.1WhatCanIDo?........................................................................................205 10.2垂直权限管理...........................................................................................208 10.3水平权限管理...........................................................................................211 10.4OAuth简介..............................................................................................213 10.5小结..........................................................................................................219 第11章加密算法与随机数.........................................................................................220 11.1概述..........................................................................................................220 11.2StreamCipherAttack................................................................................222 11.2.1ReusedKeyAttack............................................................................222 11.2.2Bit-flippingAttack............................................................................228 11.2.3弱随机IV问题................................................................................230 11.3WEP破解.................................................................................................232 11.4ECB模式的缺陷......................................................................................236 11.5PaddingOracleAttack...............................................................................239 11.6密钥管理..................................................................................................251 11.7伪随机数问题...........................................................................................253 11.7.1弱伪随机数的麻烦...........................................................................253 11.7.2时间真的随机吗...............................................................................256 11.7.3破解伪随机数算法的种子.................................................................257 11.7.4使用安全的随机数...........................................................................265 11.8小结..........................................................................................................265 (附)UnderstandingMD5LengthExtensionAttack....................................267 第12章Web框架安全...............................................................................................280 12.1MVC框架安全.........................................................................................280 12.2模板引擎与XSS防御..............................................................................282 12.3Web框架与CSRF防御............................................................................285 12.4HTTPHeaders管理..................................................................................287 12.5数据持久层与SQL注入..........................................................................288 12.6还能想到什么...........................................................................................289 12.7Web框架自身安全...................................................................................289 12.7.1Struts2命令执行漏洞.......................................................................290 12.7.2Struts2的问题补丁..........................................................................291 12.7.3SpringMVC命令执行漏洞................................................................292 12.7.4Django命令执行漏洞.......................................................................293 12.8小结..........................................................................................................294 第13章应用层拒绝服务攻击.....................................................................................295 13.1DDOS简介...............................................................................................295 13.2应用层DDOS...........................................................................................297 13.2.1CC攻击...........................................................................................297 13.2.2限制请求频率..................................................................................298 13.2.3道高一尺,魔高一丈........................................................................300 13.3验证码的那些事儿...................................................................................301 13.4防御应用层DDOS...................................................................................304 13.5资源耗尽攻击...........................................................................................306 13.5.1Slowloris攻击..................................................................................306 13.5.2HTTPPOSTDOS..............................................................................309 13.5.3ServerLimitDOS..............................................................................310 13.6一个正则引发的血案:ReDOS................................................................311 13.7小结..........................................................................................................315 第14章PHP安全.......................................................................................................317 14.1文件包含漏洞...........................................................................................317 14.1.1本地文件包含..................................................................................319 14.1.2远程文件包含..................................................................................323 14.1.3本地文件包含的利用技巧.................................................................323 14.2变量覆盖漏洞...........................................................................................331 14.2.1全局变量覆盖..................................................................................331 14.2.2extract()变量覆盖.............................................................................334 14.2.3遍历初始化变量...............................................................................334 14.2.4import_request_variables变量覆盖.....................................................335 14.2.5parse_str()变量覆盖..........................................................................335 14.3代码执行漏洞...........................................................................................336 14.3.1“危险函数”执行代码......................................................................336 14.3.2“文件写入”执行代码......................................................................343 14.3.3其他执行代码方式...........................................................................344 14.4定制安全的PHP环境..............................................................................348 14.5小结..........................................................................................................352 第15章WebServer配置安全...................................................................................353 15.1Apache安全.............................................................................................353 15.2Nginx安全...............................................................................................354 15.3jBoss远程命令执行.................................................................................356 15.4Tomcat远程命令执行..............................................................................360 15.5HTTPParameterPollution.........................................................................363 15.6小结..........................................................................................................364 第四篇互联网公司安全运营 第16章互联网业务安全............................................................................................366 16.1产品需要什么样的安全............................................................................366 16.1.1互联网产品对安全的需求.................................................................367 16.1.2什么是好的安全方案........................................................................368 16.2业务逻辑安全...........................................................................................370 16.2.1永远改不掉的密码...........................................................................370 16.2.2谁是大赢家......................................................................................371 16.2.3瞒天过海.........................................................................................372 16.2.4关于密码取回流程...........................................................................373 16.3账户是如何被盗的...................................................................................374 16.3.1账户被盗的途径...............................................................................374 16.3.2分析账户被盗的原因........................................................................376 16.4互联网的垃圾...........................................................................................377 16.4.1垃圾的危害......................................................................................377 16.4.2垃圾处理.........................................................................................379 16.5关于网络钓鱼...........................................................................................380 16.5.1钓鱼网站简介..................................................................................381 16.5.2邮件钓鱼.........................................................................................383 16.5.3钓鱼网站的防控...............................................................................385 16.5.4网购流程钓鱼..................................................................................388 16.6用户隐私保护...........................................................................................393 16.6.1互联网的用户隐私挑战.....................................................................393 16.6.2如何保护用户隐私...........................................................................394 16.6.3Do-Not-Track...................................................................................396 16.7小结..........................................................................................................397 (附)麻烦的终结者........................................................................................398 第17章安全开发流程(SDL).................................................................................402 17.1SDL简介..................................................................................................402 17.2敏捷SDL..................................................................................................406 17.3SDL实战经验..........................................................................................407 17.4需求分析与设计阶段...............................................................................409 17.5开发阶段..................................................................................................415 17.5.1提供安全的函数...............................................................................415 17.5.2代码安全审计工具...........................................................................417 17.6测试阶段..................................................................................................418 17.7小结..........................................................................................................420 第18章安全运营........................................................................................................422 18.1把安全运营起来.......................................................................................422 18.2漏洞修补流程...........................................................................................423 18.3安全监控..................................................................................................424 18.4入侵检测..................................................................................................425 18.5紧急响应流程...........................................................................................428 18.6小结..........................................................................................................430 (附)谈谈互联网企业安全的发展方向.......................................................431

白帽子讲Web安全(纪念版).epub"网盘下载"

版权说明

1、本站不保存、不存储任何实质资源,以上二维码指向为网盘资源链接,其内容归对应版权方所有
2、如有侵犯版权的情况,请点击下面举报/反馈按钮反馈或发送邮件[email protected]投诉说明情况
3、我们核实后将第一时间删除相关页面内容,谢谢理解和配合

这些人下载过 (12)
  • Hotness.(炽热.)
  • 大风车吱呀吱悠悠的转
  • 岁月如歌
  • 北境子栀
  • 发梢亲吻
  • 让你懂我
  • 庭外院说客
  • 烟雾扰山河
  • 浪野
  • 坚定不移等你归来
  • 讨她欢心
  • 故事一半
最新回复 (0)

    暂无评论

请先登录后发表评论!

返回
请先登录后发表评论!