March 6, 2002

Fingerprinting Web server attacks

Author: JT Smith

LinuxSecurity Contributors writes, "In this article, zenomorph discusses multiple ways attackers attempt to exploit port 80 to gain
control of a web server. Using this information, an administrator can learn to detect potential
attacks and steps that are necessary to protect a server from them. Nice discussion of cross-site scripting vulnerabilities, and more. rprinting-http.html."


  • Linux
Click Here!