June 2017
Intermediate to advanced
510 pages
11h 35m
English
In the previous chapters, we reviewed the attacker's kill chain–the specific approach used to compromise networks and devices, and disclose data or hinder access to network resources. In Chapter 5, Physical Attacks and Social Engineering, we examined the routes of attack, starting with physical attacks and social engineering. In Chapter 6, Wireless Attacks, we saw how wireless networks could be compromised. In this chapter, we'll focus on one of the most common attack routes, through websites and web-based applications.
Websites that deliver content and web-based services (for example, emails and FTP) are ubiquitous, ...
Read now
Unlock full access