Fingerprinting Web server attacks

15

Author: JT Smith

LinuxSecurity Contributors writes, “In this article, zenomorph discusses multiple ways attackers attempt to exploit port 80 to gain
control of a web server. Using this information, an administrator can learn to detect potential
attacks and steps that are necessary to protect a server from them. Nice discussion of cross-site scripting vulnerabilities, and more.

http://www.linuxsecurity.com/feature_stories/finge rprinting-http.html.”

Category:

  • Linux