Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello, everyone, and welcome back to the course.
00:02
After a brief introduction in the last video, we restart our review. First, we review the Web application protector and its components.
00:12
Let me start with the questions.
00:14
Check this information
00:16
Web application Are exempt off clients Ever more application.
00:20
Is this information to off us,
00:24
Lizzie for missions? True,
00:25
we will discuss the quiet several models during this video.
00:29
Let's check the learning objective off this video.
00:32
The learning objectives off this video are
00:35
review the replication of a texture,
00:38
and it's the client serving model.
00:41
Reviewed the replication components
00:43
like Web server inclines.
00:47
To start, Let's define what is a Web application.
00:51
According to Wikipedia, a Web
00:55
is a client server application that runs in the Web browser.
00:59
The Web applications can be historic.
01:00
Our dynamic with main features
01:03
one that simple off stat page ISS
01:07
testy basis are just images.
01:11
Although the dynamic for Beijing contains a lot off screams to change their webpage,
01:18
for example, for two different users, the Web's ever came saying different Web pages.
01:23
It happens because they squeaked in that fire. The user.
01:27
The advertising content is a good example.
01:32
The same. My page contains different ads for different users.
01:37
That's why we say there is the name social network, and that's banking are good examples off the named page for each user, the social network are the Internet banking.
01:51
We'll display a different continent.
01:53
Usually did. The name contents are controlled by a nap vacation server.
01:59
You see later in this video that application server is one off the components off the modern Web applications.
02:07
More definitions.
02:08
Do you know what? How the things are,
02:12
you know?
02:13
Ah, huge network. Compose it off. Many other is Molly Networks.
02:17
For example. Your cell phone is inside I small a network, and it connects to the Internet. Double double job par Would What Web
02:27
is this? Received a portion off in the red. That hostess website. Our Web page is also no s Web.
02:35
HTML.
02:36
The four language to be a Web page in Web applications.
02:39
Even if you heard about pee HB
02:43
are the net
02:45
All those language use HTML to work?
02:49
Http. The protocol used to transmit messages by doubled overdub
02:54
is the protocol that the Klein uses to talk with the Web server.
02:59
They were replication. Architecture uses clients ever mother.
03:04
It is composed by two components.
03:07
The Clarence making requests
03:08
and this ever answering their requests.
03:13
The requires his uses. Http protocol.
03:16
The process is like this.
03:17
We have a Web browsing
03:20
that requires some information.
03:22
Use Http to the website.
03:23
The Web seven. This is the request years in 80 to pitch you
03:29
with the divers off in a red,
03:30
and the increased number off service is offered
03:34
the Web navigation evolving
03:36
The number of dynamic you airbase increased a lot
03:39
that is common to have which layer applications
03:44
the blind stock with the first layer.
03:46
The presentation later
03:47
that contains the Web server
03:51
This observed often talks with the implication server
03:54
in addiction to handle the data is coming to see a database server as one off the components,
04:01
for example, for a banking application. The Web seven. We showed the Web page application server. We were in the process to calculate your savings and the database We start your name accounts into some out
04:15
the painting on the Web application, the Web's African talked with application safer and database server,
04:21
although the question not connect to application or database service.
04:28
Other communication with the client is handled by the Web server.
04:31
Now think
04:32
how many people access the same Web based on the same time.
04:38
Terrific that only one Web seven can handle other requests.
04:43
One. Information. By the age of 2018 we had around 4.3 billion people who access Web
04:49
us all these requests.
04:51
The number off seven is high
04:54
choice. All this requests is using a load balanced solution.
04:58
She shared the workload on the service.
05:00
More service are included on our layers.
05:04
That's how it's possible to many people access the same resources on the same time.
05:10
Now let's talk about Weber Clyde's.
05:13
The Web service has the weapon, and it's waiting for the request for these pages,
05:18
the client's us The page to the Web server
05:21
Send requests to the Web. Seven is a Web quite job.
05:26
There's no S user Asians.
05:28
Web browsers are the most no
05:30
union's Web browsers. On your computers and on your mobile.
05:35
Microsoft add Mozilla Firefox, Google Chrome are some examples,
05:41
although other problems can do, they say that's what browses
05:46
saying. Http requests
05:47
so make samples are in can tell that core and obligated.
05:54
This is easy because it should be his text based
05:57
you ever see letting discourse that the request is some texts with Commons?
06:02
He had exit off turn it requests in the fire folks
06:06
to clarify, Let is acute. The telnet Komen's
06:12
on the linens machine really works is the cyber Web page using that on that?
06:16
If Suk says it will show that you're connected to Siberia
06:21
in this moment, the Web seven is waiting for the judge to be requests to be answered. If we sent to the Server of Wrong request, it will answer with a bad request.
06:32
Let's see one more example.
06:35
Place right, Rox. Is this ivory webpage?
06:39
If he is Fire Force or another Web browser, you you get a nice speaking with you. Never.
06:45
If you do the same years ended up get you will get the same ever. But in text form, it's
06:51
the request. Is this say the insurance is saying? But how the issue is displayed? It's different.
06:58
I don't get is a common softly falling systems.
07:01
Let's see that you get working double God can be considered as a test basic Web browser.
07:09
First, we will request this cyber web page.
07:13
You can see here that it worked
07:15
Now let's request the same Web page as example.
07:19
The Web seven. Answer. But you can see the 400 forever
07:25
basic difference between telnet in double get. Is that down it? You need to craft all the requests.
07:31
Telnet Well, not said they teach the request to the Web. Seven.
07:36
Double get is wreck a browser It We've sent the request
07:42
after talk about glides and use agents. The next part of Web application components is the Web seven,
07:48
I said before the Web servers I responsible to answer the client's inquests.
07:54
The most common Web seven today are
07:56
Apache in Jets
07:59
and Microsoft Internet Information Service is
08:01
they have some difference.
08:03
However, I'll do the expected job off a Web servant.
08:07
Well, of course, the difference will be on the logs
08:11
if we talk about the faux configurations off logging Apache inject slugs
08:16
looks almost the same,
08:18
and Microsoft yes, has a different lock structure.
08:22
Well, you showed this defense on that sweetness.
08:26
You can get more information about this Web service, eats websites,
08:31
place just some questions,
08:33
Poster says. My question. Complete the sentences
08:37
you can positive, you know, if you want.
08:41
The correct sentence is
08:43
www uses the protocol, which it should be to trust messages through computer networks.
08:50
It uses the clients ever model job, period
08:52
Mozilla Firefox Google, Chrome in Microsoft edge on examples Off browser
08:58
and they are problems that make requests to the Web. Seven. Blood Apache Angie Eggs In My Cross Off my eyes
09:07
The second city answer is
09:09
get is an exit off http Method
09:13
and 200 is example off. Http Starts code
09:18
Video Review
09:18
In this video, we talked about Web application teacher and client server model.
09:24
We also talked about some definitions
09:26
the user, Asians and Web service.
09:30
In the next video, we'll focus on http starts, codes, a little chippy methods.
09:35
We will also do a brief review off D C P I P Protocol.

Up Next

Identifying Web Attacks Through Logs

This course will review web application infrastructure, web servers, and the logs associated with them. We will also simulate 10 attack scenarios and identify the attack through logs that are generated by the web server.

Instructed By

Instructor Profile Image
Igor Vieira
Information Security Analyst
Instructor