Chapter 8. Web Server Hacking, Web Applications, and Database Attacks

This chapter covers the following topics:

Image Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.

Image Web Application Hacking: Application designers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on web applications and Web 2.0 technologies.

Database Hacking: SQL injection is one of the ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.