Chapter 19. Putting It All Together

Throughout this book, we have covered various attack methods and tools, and how to defend against them. From a learning standpoint, each tool was covered separately and explained in detail. In practice, an attacker never runs just a single tool against a site, usually he combines several tools or methodologies together. Although it is important to defend against each specific tool, it is also important to keep in mind the big picture, the steps an attacker would take to compromise a system. In Chapter 2, “How and Why Hackers Do It” we covered the general steps an attacker takes to compromise a system:

  1. Passive ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.