O'Reilly logo

Web Penetration Testing with Kali Linux by Aamir Lakhani, Joseph Muniz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Web Attacks

The focus of this chapter will be on Internet-based attacks. Security administrators for organizations are aware that there are malicious parties on the Internet, continuously looking for ways to penetrate any network they come across and in defense, administrators have security measures in place. Common defenses include Firewalls, IPS/IDS, host-based security products, such as Anti-Virus, Content Filters, etc. In the past, these defenses were sufficient; however, threats are becoming more sophisticated nowadays, with the ability to circumvent commercial off the shelf or "COTS" security solutions. The tools covered in this chapter will include methods in Kali Linux, used to bypass standard security defenses from a remote ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required