Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
140 Chapter 4 • Vulnerable CGI Scripts
common mistakes and following good practices when creating CGI
scripts, you can write tighter code that prevents your system from being
attacked. Some of the problems we’ll discuss here regard controlling per-
missions, user input, and using error-handling code.
In creating CGI scripts, you will probably create an interface that
will access your CGI program. In most cases, this will be a form that
allows users to enter data on a Web page. Upon clicking Submit, data is
then passed to the CGI program to be processed. However, while this is
the common method used to access CGI programs, it is important to
realize that ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312