Chapter 7. Web Server Hacking, Web Applications, and Database Attacks

This chapter covers the following topics:

Image Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.

Image Web Application Hacking: Application designers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on web applications and Web 2.0 technologies.

Database Hacking: SQL injection is one of the ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.