Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
This chapter covers the following topics:
Web Server Hacking: Because they are available to anyone with an Internet connection, web servers are a constant target of attackers.
Web Application Hacking: Application developers have an important job in that they must verify all data and understand that all input/output and processed data must be validated because organizations rely heavily on modern web applications.
Database Hacking: SQL injection has been one of the most common attacks for years. It takes advantage of unvalidated input and potentially can give attackers access to sensitive data (even credit card numbers).
Web-based applications are everywhere. You can find ...
Get Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.