The security world has spent the last decade focusing on protecting networks from traditional security attack vectors. Network Firewalls and related filtering solutions today have reached levels sophisticated enough to allow drag and drop enforcement of security policies. The goal posts however have shifted once more with the wide spread deployment of custom and COTS web based applications. These web applications can not be protected by the solutions that security professionals have become accustomed to, and in many cases need to be re-written from the ground up with security in mind. This talk will highlight some of the attack vectors in this new security playground and discuss potential solutions and work arounds.
CITATION STYLE
Rahalkar, S. A. (2016). Web Application Hacking. In Certified Ethical Hacker (CEH) Foundation Guide (pp. 131–141). Apress. https://doi.org/10.1007/978-1-4842-2325-3_10
Mendeley helps you to discover research relevant for your work.