CHAPTER 6
Web-Based Hacking: Servers and Applications
In this chapter you will
• Identify features of common web server architecture
• Inspect web application function and architecture points
• Describe web server and web application attacks
• Identify web server and application vulnerabilities
• Explore web application hacking tools
Have you ever seen the movie The Shawshank Redemption? If you haven’t and we were all in a classroom together, I’d probably stop all proceedings and make the entire lot of you reading this book go watch it because I’m entirely unsure any pen test team can function with members who have not seen it. However, we’re not in class, and you’re free to do whatever you want, so the best I can do for those of you ...
Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.