O'Reilly logo

Web Hacking: Attacks and Defense by Shreeraj Shah, Saumil Shah, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. URL: The Web Hacker's Sword

 

The light-saber is a Jedi's weapon—not as clumsy or random as a blaster.

 
 --Obi-Wan Kenobi, "Star Wars: Episode IV"

Introduction

In the grab bag of countless hacking techniques, Web hacking is by far the most elegant (if we dare use such praise). The simplicity and elegance of using a common browser to mount the most devastating attacks is pure brilliance, and they are events to behold. Sometimes difficult to fathom, Web hacking techniques can be trivial yet have devastating consequences. Did you know that a perfectly placed “%%” can blow a gaping hole in the security of your online e-commerce application?

Carrying out a Web hack is like performing microsurgery through a small opening. The operation requires ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required