O'Reilly logo

Joomla! Web Security: Secure your Joomla! Website from Common Security Threats with this easy-to-use Guide by Tom Canavan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sizing up the Target

Let’s say you wanted to get inside a website for evil purposes. It doesn’t matter why you want to do this, what matters is how and what you do when you get in.

Firstly, you should identify the website. If you didn’t have the name, you could Google for it, ask around, or just surf forums and find it. We’ll call our site exampletarget.com. The first thing you want to do is gather as much information about this site as you can.

Here is a list of things you will want to know:

  • What is the host name?

  • Where are they hosted (what web host)?

  • Which operating system do they have?

  • What is their website built on (Joomla!, Mambo, Drupal, HTML, and so on)?

  • What are their IP address, name servers, and so on?

  • What is the “network IP range” of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required