This chapter covers the following topics:
• Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.
• Web Application Hacking: Application developers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on modern web applications.
• Database Hacking: SQL injection has been one of the most common attacks for years. It takes advantage of unvalidated input and potentially can give attackers access to sensitive data (even credit card numbers).
Web-based applications are everywhere. You can find ...