CHAPTER 11
Attacking Applications
In this chapter, you will learn how to
• Define web applications, explain web application architecture, and explain why web servers are compromised and web pages are defaced
• Provide an overview of web logs, describe Internet Information Services (IIS) and Apache web server logs and how to investigate them
• Discuss different types of web attacks, how to investigate web attacks, and explain the investigation process for attacks in Windows-based servers
• Articulate when web page defacement occurs and discuss various security strategies for web applications
• List several web attack detection tools, and discuss different tools for locating IP addresses
Get CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.