O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • List the types of web server vulnerabilities

  • Understand the attacks against web servers

  • Understand IIS Unicode exploits

  • Understand patch-management techniques

  • Understand Web Application Scanner

  • What is the Metasploit Framework?

  • Describe web server hardening methods

  • Understand how web applications work

  • Objectives of web application hacking

  • Anatomy of an attack

  • Web application threats

  • Understand Google hacking

  • Understand web application countermeasures

  • List the authentication types

  • What is a password cracker?

  • How does a password cracker work?

  • Understand password attacks—classification

  • Understand password-cracking ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required