Table of Contents
1. Introduction: Java Security, Secure Coding, and Penetration Testing
2. Reconnaissance and Mapping
3. Hands-on with Web Proxies
4. Observability with SQL Injections
5. Misconfiguration with Default Values
6. CORS Exploitation
7. Exploring Vectors with DoS Attacks
8. Executing Business Logic Vulnerabilities
9. Authentication Protocols
10. Session Management
11. Authorization Practices
12. Java Deserialization Vulnerabilities
13. Java Remote Method Invocation Vulnerabilities
14. Java Native Interface Vulnerabilities
15. Static Analysis of Java Android Applications
16. Dynamic Analysis of Java Android Applications
17. Network Analysis of Java Android Applications
Appendix