Anatomy of Web Applications

Web applications have become a staple of interactions between customers and organizations. Applications such as Microsoft SharePoint, Moodle, and many others have been embraced for all sorts of reasons, ranging from organization of data to streamlined customer access. Applications in this category are typically designed to be accessed from a web browser or similar client application that uses HTTP to exchange information between the client and server.

Exploitative behaviors include the following:

  • Theft of information, such as payment cards or other sensitive data

  • The ability to update the application and site content

  • Server-side scripting exploits

  • Buffer overflows

  • Domain Name System (DNS) attacks

  • Destruction ...

Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.