O'Reilly logo

CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide by Charles L. Brooks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11

Attacking Applications

    In this chapter, you will learn how to

 

        • Define web applications, explain web application architecture, and explain why web servers are compromised and web pages are defaced

        • Provide an overview of web logs, describe Internet Information Services (IIS) and Apache web server logs and how to investigate them

        • Discuss different types of web attacks, how to investigate web attacks, and explain the investigation process for attacks in Windows-based servers

        • Articulate when web page defacement occurs and discuss various security strategies for web applications

        • List several web attack detection tools, and discuss different tools for locating IP addresses

        

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required