Informed XPath Injection
318
Blind XPath Injection
319
Finding
XPath Injection Flaws
320
Preventing XPath Injection
321
Injecting into SMTP
321
Email
Header Manipulation
322
SMTP Command Injection
323
Finding SMTP Injection Flaws
324
Preventing
SMTP Injection
326
Injecting into LDAP
326
Injecting Query Attributes
327
Modifying
the Search Filter
328
Finding LDAP Injection Flaws
329
Preventing LDAP Injection
330
Chapter
Summary
331
Questions
331
Chapter 10 Exploiting Path Traversal
333
Common Vulnerabilities
333
Finding and Exploiting Path Traversal Vulnerabilities
335
Locating Targets for Attack
335
Detecting Path Traversal Vulnerabilities
336
Circumventing Obstacles to Traversal Attacks
339
Coping with Custom Encoding
342
Exploiting Traversal Vulnerabilities
344
Preventing Path Traversal Vulnerabilities
344
Chapter Summary
346
Questions
346
Do'stlaringiz bilan baham: