Attacking Applications

    In this chapter, you will learn how to


        • Define web applications, explain web application architecture, and explain why web servers are compromised and web pages are defaced

        • Provide an overview of web logs, describe Internet Information Services (IIS) and Apache web server logs and how to investigate them

        • Discuss different types of web attacks, how to investigate web attacks, and explain the investigation process for attacks in Windows-based servers

        • Articulate when web page defacement occurs and discuss various security strategies for web applications

        • List several web attack detection tools, and discuss different tools for locating IP addresses


Get CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.