Chapter 6. Web Attacks
The focus of this chapter will be on Internet-based attacks. Security administrators for organizations are aware that there are malicious parties on the Internet, continuously looking for ways to penetrate any network they come across and in defense, administrators have security measures in place. Common defenses include Firewalls, IPS/IDS, host-based security products, such as Anti-Virus, Content Filters, etc. In the past, these defenses were sufficient; however, threats are becoming more sophisticated nowadays, with the ability to circumvent commercial off the shelf or "COTS" security solutions. The tools covered in this chapter will include methods in Kali Linux, used to bypass standard security defenses from a remote ...
Get Web Penetration Testing with Kali Linux now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.