O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Web Server Hacking, Web Applications, and Database Attacks

This chapter covers the following topics:

Image Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.

Image Web Application Hacking: Application designers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on web applications and Web 2.0 technologies.

Database Hacking: SQL injection is one of the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required