Chapter 8. Web Server Hacking, Web Applications, and Database Attacks
This chapter covers the following topics:
Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.
Web Application Hacking: Application designers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on web applications and Web 2.0 technologies.
Database Hacking: SQL injection is one of the ...
Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.