Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
182 Chapter 5 • Hacking Techniques and Tools
From the response the server provided, we now know that this
system’s OS is Microsoft NT and the Web server is Microsoft’s Internet
Information Server version 4.0.This alone is more than sufficient infor-
mation on which we can base our attack.
Building an Execution Plan
When building an attack execution plan, one must take into account the
following factors:
A vulnerable service must be presently running and accept con-
nections from the rest of the Internet.
Exploits utilized must not entail any form of Denial of Service
(DoS; which would give away the attack).
Local or console exploits (such as booting fr ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312