O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Changing Face

This chapter deals with a Web site defacement performed as part of a security assessment for a university client. The case description will not only cover the technical process, but will also address some of the things that can go wrong when the consultant/client relationship is not clearly defined.

Introduction

The security department of a local university issued a Request for Proposal (RFP) seeking a security assessment of one component of their Web infrastructure. Specifically, they were interested in reviewing the security posture of the machine hosting the HTML pages for their Web site. Because the task seemed fairly straightforward and the individual in charge of security of the Web site at the school was an old colleague, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required