Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
212 Chapter 5 • Hacking Techniques and Tools
Q: I understand that hackers can determine what OS and service I’m
running when the service identifies itself.What can I do to obscure
that information so the hacker can’t tell I’m running Brand X oper-
ating system and service?
A:You can obscure the OS and service identification, but it truly
doesn’t buy you any real security benefit.The novice intruder will
still run innumerable attack styles against you, and the seasoned
intruder will see right through the ruse. As a rule, it’s far more advis-
able to simply stay abreast of the latest vulnerabilities and current
patches on your system.The latter approach will ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312