Better to light a candle than to curse the darkness.
In this chapter, we shine a bright spotlight on the digital battlefield of the Web. We focus on the functional components of a typical Web application, and how they all fit together. Understanding the pieces of the Web puzzle will allow you to assemble a security masterpiece.
In Chapter 5, we hinted at ways in which attackers can figure out what is running on a Web server by simply analyzing URLs. Here we extend those ideas and identify various Web server technologies.
In this chapter we cover:
Building a Web application environment
Identifying various technologies from URLs
Examining errors reported by Web applications ...