Fr. 80.50

Zed Attack Proxy Cookbook - Hacking tactics, techniques, and procedures for testing web applications and APIs

English · Paperback / Softback

Shipping usually within 2 to 3 weeks (title will be printed to order)

Description

Read more










Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool
Purchase of the print or Kindle book includes a free PDF eBook

Key Features:Master ZAP to protect your systems from different cyber attacks
Learn cybersecurity best practices using this step-by-step guide packed with practical examples
Implement advanced testing techniques, such as XXE attacks and Java deserialization, on web applications

Book Description:
Maintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool.
Zed Attack Proxy Cookbook contains a vast array of practical recipes to help you set up, configure, and use ZAP to protect your vital systems from various adversaries. If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP.
You'll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. As you progress, you'll go through a myriad of step-by-step recipes detailing various types of exploits and vulnerabilities in web applications, along with advanced techniques such as Java deserialization.
By the end of this ZAP book, you'll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.

What You Will Learn:Install ZAP on different operating systems or environments
Explore how to crawl, passively scan, and actively scan web apps
Discover authentication and authorization exploits
Conduct client-side testing by examining business logic flaws
Use the BOAST server to conduct out-of-band attacks
Understand the integration of ZAP into the final stages of a CI/CD pipeline

Who this book is for:
This book is for cybersecurity professionals, ethical hackers, application security engineers, DevSecOps engineers, students interested in web security, cybersecurity enthusiasts, and anyone from the open source cybersecurity community looking to gain expertise in ZAP. Familiarity with basic cybersecurity concepts will be helpful to get the most out of this book.

About the author










Ryan Soper is a Senior Application Security Engineer, Web Application Penetration Tester, and USCG Veteran. His career has given him a vast amount of experience in IT consulting & Managed Services across the cyber security landscape. From Application Security and Vulnerability Management to Penetration Testing within industries such as Military, Government, Financial & Investing Services, Banking, and other Professional Services. Ryan is an active member and organizer of DefCon813 and a member of the OWASP Tampa Chapter. Find Ryan on Twitter at soapszzz.

Product details

Authors Ahmed Almoailu, Ryan Soper, Nestor N Torres, Nestor N. Torres
Publisher Packt Publishing
 
Languages English
Product format Paperback / Softback
Released 01.03.2023
 
EAN 9781801817332
ISBN 978-1-80181-733-2
No. of pages 284
Dimensions 191 mm x 235 mm x 16 mm
Weight 536 g
Subjects Guides
Natural sciences, medicine, IT, technology > IT, data processing > Hardware

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.