O'Reilly logo

Web Hacking: Attacks and Defense by Shreeraj Shah, Saumil Shah, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Site Linkage Analysis

 

He left a corsair's name to other times, link'd with one virtue and a thousand crimes.

 
 --George Gordon Noel Byron, Lord Byron (1788-1824)

Introduction

Recall that a Web application consists of several components, including a front-end Web server, an application server, and a database server. To understand the risk inherent in these components as a whole, you have to analyze and understand the importance and functionality of each of them. In this chapter we describe techniques for identifying and categorizing all the Web resources and technologies used in a Web application.

“Web resources” are objects accessible to the browser via HTTP or HTTP over SSL. A Web resource may be a static HTML file, a program that dynamically ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required