Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
160 Chapter 4 • Vulnerable CGI Scripts
you the ability to specify a different name for these directories. For
example, you could specify that CGI scripts and programs are contained
in a directory named CGI, PROGS, or any other name you choose. If a
hacker who exploits CGI vulnerabilities goes to your site, he or she will
find that a CGI-BIN directory isn’t there.The hacker may feel it’s easier
to move on to another site that does have a CGI-BIN, and leave you
alone. Moreover, as mentioned earlier, most hacking tools that look for
CGI vulnerabilities will only look in the CGI-BIN. Since this directory
doesn’t exist, these tools will either show that no ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312