Chapter 12 -- Securing Against Attack

[Previous] [Next]

Chapter 12

At last, you've built your Web application and it's time to go live on the Web. Now the fun really starts! The Web has often been referred to as the "Wild, Wild Web," and for good reason—many people on the Web want to attack or access your computer without your sanction.

IMPORTANT

This chapter describes some of the procedures hackers use to attack servers and includes source code for mounting such attacks. We thought it best to show you what real hackers do to real servers so that you can better understand how to protect yourself. We in no way condone hacking into computer systems. To paraphrase Sun Tzu in The Art of War, "Know your enemy."

Much of the inspiration for this chapter comes from Farmer and Venema's classic paper, "Improving the Security of Your Site by Breaking into It." While this is an old, UNIX-centric paper, it focuses on what hackers do to attempt to break into systems. With these ideas and concepts in mind, you can increase the security of your network.

It's also important to note that little of this material is new. If you were to surf the Web long enough, you'd find all of this material. We decided to gather the key information into one chapter to save you the time and effort.

This chapter covers the following topics:

  • Why people attack Web servers
  • How people attack Web servers
  • Some common attacks
  • How to detect whether you're under attack
  • User input attacks
  • What to do if you're under attack


Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
ISBN: N/A
EAN: N/A
Year: 1999
Pages: 138

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net