Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

NoSQL Injection for Elasticsearch
NoSQL Injection for Elasticsearch
NoSQL Injection for Elasticsearch
Ebook33 pages14 minutes

NoSQL Injection for Elasticsearch

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This E-book is great for computer security professionals who want to keep up to date on how hackers are exploiting cutting-edge technologies. This E-book is a step-by-step guide on exploiting NoSQL Injections for the Elasticsearch database. Also, the E-book discusses how to secure these systems from being vulnerable to NoSQL Injections, in order to secure your data from attackers. The E-book will quickly go from the basics of using Elasticsearch to how to exploit a web service written in Node.js (i.e. Server-Side Javascript) using Elasticsearch as a database.
LanguageEnglish
PublisherLulu.com
Release dateJan 11, 2015
ISBN9781312825437
NoSQL Injection for Elasticsearch

Related to NoSQL Injection for Elasticsearch

Related ebooks

Computers For You

View More

Related articles

Reviews for NoSQL Injection for Elasticsearch

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    NoSQL Injection for Elasticsearch - Gary Drocella

    NoSQL Injection for Elasticsearch

    NoSQL Injection for Elasticsearch

    Gary Drocella

    Table of Contents

    Introduction

    Chapter 1 Installing Elasticsearch

    Section 1.1: Install on Mac OSX

    Section 1.2: Install on Red hat Linux

    Section 1.3: Install on Windows

    Chapter 2 Elastic Search Basics

    Section 2.1: Document Creation

    Section 2.2: Document Retrieval

    Section 2.3: Document Update

    Section 2.4: Document Delete

    Chapter 3 A Vulnerable Web Service using Elasticsearch

    Section 3.1: Vulnerable Web service code

    Section 3.2: HTML Front-end

    Chapter 4 Exploiting the Vulnerable Web Service

    Section 4.1: Breaking The Search Form

    Section 4.2: Examining the Query

    Section 4.3: Exploiting the Web Service

    Chapter 5 Securing the Vulnerable Web service

    Section 5.1: Preventing NoSQL Injections

    Section 5.2: Error Handling

    Section 5.3: Hashing and Encrypting Data

    Conclusion

    References

    Introduction

    This

    Enjoying the preview?
    Page 1 of 1