Skip to Content
Network Security Assessment, 3rd Edition
book

Network Security Assessment, 3rd Edition

by Chris McNab
December 2016
Beginner content levelBeginner
494 pages
12h 34m
English
O'Reilly Media, Inc.
Content preview from Network Security Assessment, 3rd Edition

Chapter 13. Assessing Web Servers

Web servers demand a high degree of assurance because they are often exposed to untrusted networks. I discuss tactics and tools used to test these servers and their enabled subsystems in this chapter. Assessment of application frameworks (e.g., Microsoft ASP.NET and Rails) is covered in Chapter 14.

Assessment and hardening of web servers, frameworks, and applications fill entire books. Here I present a concise methodology for fingerprinting, investigating, and qualifying vulnerabilities within available HTTP services, involving the following steps:

  1. Identification of proxy mechanisms

  2. Enumeration of virtual hosts and accessible websites

  3. For each site identified:

    1. Profiling the server software and available subsystems

    2. Active scanning and crawling to identify useful content and functionality

    3. Attacking exposed authentication mechanisms

    4. Qualifying vulnerabilities in server software

Web applications are often presented through load balancers, and so the first two steps are important. Consider Figure 13-1, in which a client connection is made over TLS to a load balancer that is then directed to an application server internally (via HTTP) based on the Host value provided.

Connecting to a virtual host via HTTP 1.1 and TLS
Figure 13-1. Connecting to a virtual host via HTTP 1.1 and TLS

You will encounter one of three scenarios during testing:

  • Directly accessing a single server hosting ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781491911044Supplemental ContentErrata Page