Tag Archive: Black hat

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.


The Term Hacker has several definitions. Habitually Hacker is a person who are enthusiasts in digital computing, they have more knowledge than that of the normal user. It doesn’t matter that a hacker should master only in computers, they may master any thing like mobile phones, PDA’s, Digi- Cam’s, Signals, Hand held devices and so on.

In Computing hackers are clever programmers. In Security Terminology Hackers are the person who really enjoys computing, Programming and the one who deals more with any electronic devices, most often computers by exploring new techniques and tweaking them.

Hackers are skilled person who are good programmers with a good attitude but, Nowadays the term hacker is used with negative connotation because of media’s. Lemme make it clear why the term ‘Hacker’ Such a bad impression among public or its vague.

In security terminology hackers are further classified into three main types based upon how they use their skills in the real world.