Introduction to Hacking Web Servers

FacebookTwitterGoogle+LinkedInEmail
Description
[toggle_content title="Transcript"] Leo Dregier in this module I want to talk about attacking the web server in itself. Now in today's network you are going to hit a web server sooner or later. There is lot of inter-related components everything from how did the web servers communicate with databases and that opens up another pandora's box like SQL injection or any sort of database injection. We are going to talk about the popular web servers like Microsoft and Apache but then some of the not the so popular ones as well. We are also going to talk about how to do a lot of the stuff manually in beginners section but in the advanced section I really want to start using advanced tools like Metaspled. So that is going to take off dramatically once we get to the advanced section. But all of this stems around the client and server architecture. The protocols that they use and the methodologies in which you can manipulate to ultimately get information disclosed to you or to change something on the web server itself or how it is connected to a database. And then we will follow up with some best practices like patch management and logging and monitoring to make sure that if somebody is attacking your web server. You know how to react to it defensively. So we will start off offensively but we will follow up and finish defensively. So lots to cover in the module so let us get started. [/toggle_content] Now we're getting to the good stuff -- Hacking Web Servers! In this module, you'll learn about actual attacks on web servers.  You’ll cover variations in tools, techniques and results among the most popular web servers such as Microsoft and Apache, as well as explore other non-popular ones still in use. You’ll also learn manual techniques, advanced automated tools and the other penetration testing strategies. The topics explored in the Hacking Web Servers module include:
  • Whiteboard, which shows the interrelationship of all the basic components you’ll used in this module
  • And the following simulation labs:
    • dirBuster Lab
    • wpScan Lab
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DNS Rebinding – Behind The Enemy Lines
Views: 1659 / January 19, 2019
My IT Learning Journey
Views: 2107 / January 18, 2019
A New Age of Digital Interconnection
Views: 1717 / January 18, 2019
7 Project Management Basic Rules
Views: 2171 / January 17, 2019
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel