© Mike O'Leary 2019
Mike O'LearyCyber Operationshttps://doi.org/10.1007/978-1-4842-4294-0_21

21. Web Applications

Mike O’Leary1 
(1)
Towson, MD, USA
 

Introduction

Web applications based on the LAMP stack of Linux, Apache, MySQL, and PHP are important and a common target of attackers. Some web applications like phpMyAdmin are primarily administrative; phpMyAdmin is used to remotely manage MySQL installations. Applications like Joomla! and WordPress are content management systems that are used as the back end for many web sites; more than a quarter of web sites use WordPress or Joomla!.

Web applications can be attacked through several vectors; one approach is a brute force attack on the site’s authentication mechanism. There are Metasploit modules that ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.