Web-Based Hacking: Servers and Applications

This chapter includes questions from the following topics:

•   Identify features of common web server architectures

•   Identify web application functions and architecture points

•   Describe web server and web application attacks

•   Identify web server and application vulnerabilities

•   Identify web application hacking tools

In the spring of 1863, a mismatch was shaping up on the battlefield. General Robert E. Lee and Stonewall Jackson had amassed a sizeable Confederate force of around 60,000 men in and around Chancellorsville, Virginia, after the recent victory in Fredericksburg. Major General Joseph Hooker, however, commanded a Union army of around 130,000 men and was under direct ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.