© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. SheikhCertified Ethical Hacker (CEH) Preparation Guidehttps://doi.org/10.1007/978-1-4842-7258-9_10

10. Hacking Web Applications

Ahmed Sheikh1  
(1)
Miami, FL, USA
 

In this chapter, you will learn about hacking web application components and how to describe what occurs during a web application attack. You will also gain knowledge about effective countermeasures to help safeguard systems.

By the end of this chapter, you will be able to
  1. 1.

    Identify web application components.

     
  2. 2.

    Describe web application attacks.

     
  3. 3.

    Identify countermeasures.

     

Web Application Attacks

Web application attacks have a process, and each step is outlined below. The result of these steps may ...

Get Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.