Web Server Hacking, Web Applications, and Database Attacks


Chapter 8 introduces you to the world of the Web. It looks at the various hacks, attacks, and cracks that are targeted at Internet servers, the applications that sit behind them, and the databases in which their information is stored. It's an infrastructure ripe for attack because after all, it is the one thing that hackers everywhere can access. Your internal network might be inaccessible, your wireless network might be accessible only from inside the plant or from a close proximity, but the website has a global reach. Expect it to be probed, prodded, and scanned with regular frequency.

As an ethical hacker, you might be asked to help develop defenses to guard your organization's web-based assets, or you might be part of a penetration team tasked with finding weaknesses. The CEH exam will expect you to have a base competence in these subjects. Let's get started by reviewing web servers.

Web Server Hacking

Part I: Exam Preparation

The Business Aspects of Penetration Testing

The Technical Foundations of Hacking

Footprinting and Scanning

Enumeration and System Hacking

Linux and Automated Security Assessment Tools

Trojans and Backdoors

Sniffers, Session Hijacking, and Denial of Service

Web Server Hacking, Web Applications, and Database Attacks

Wireless Technologies, Security, and Attacks

IDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and Worms

Cryptographic Attacks and Defenses

Physical Security and Social Engineering

Part II: Final Review

Part III: Appendixes

Appendix A. Using the ExamGear Special Edition Software

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net