Chapter 7. Web Server Hacking, Web Applications, and Database Attacks

This chapter covers the following topics:

  • Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.

  • Web Application Hacking: Application developers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on modern web applications.

  • Database Hacking: SQL injection has been one of the most common attacks for years. It takes advantage of unvalidated input and potentially can give attackers access to sensitive data (even credit card numbers).

Web-based applications are everywhere. You can find ...

Get Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.