© Mike O'Leary 2019
Mike O'LearyCyber Operationshttps://doi.org/10.1007/978-1-4842-4294-0_21

21. Web Applications

Mike O’Leary1 
(1)
Towson, MD, USA
 

Introduction

Web applications based on the LAMP stack of Linux, Apache, MySQL, and PHP are important and a common target of attackers. Some web applications like phpMyAdmin are primarily administrative; phpMyAdmin is used to remotely manage MySQL installations. Applications like Joomla! and WordPress are content management systems that are used as the back end for many web sites; more than a quarter of web sites use WordPress or Joomla!.

Web applications can be attacked through several vectors; one approach is a brute force attack on the site’s authentication mechanism. There are Metasploit modules that ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.