Author: JT Smith
LinuxSecurity Contributors writes, “In this article, zenomorph discusses multiple ways attackers attempt to exploit port 80 to gain
control of a web server. Using this information, an administrator can learn to detect potential
attacks and steps that are necessary to protect a server from them. Nice discussion of cross-site scripting vulnerabilities, and more.
control of a web server. Using this information, an administrator can learn to detect potential
attacks and steps that are necessary to protect a server from them. Nice discussion of cross-site scripting vulnerabilities, and more.
http://www.linuxsecurity.com/feature_stories/finge rprinting-http.html.”
Category:
- Linux