O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
6
Web-Based Hacking: Servers and Applications
In this chapter you will
•  Identify features of common web server architecture
•  Identify web application function and architecture points
•  Describe web server and web application attacks
•  Identify web server and application vulnerabilities
•  Identify web application hacking tools
•  Describe SQL injection techniques, attacks, and tools
•  Describe buffer overflow attacks
image
Have you ever seen the movie The Shawshank Redemption? If you haven’t and we were all in a classroom together, I’d probably ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required