P. 1
hacking Module 12

hacking Module 12

Ratings: (0)|Views: 4,575|Likes:
Published by Jitendra Kumar Dash

More info:

Published by: Jitendra Kumar Dash on Aug 09, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

12/04/2012

pdf

text

original

 
NMCSP2008 Batch-I
Module XII Web Application Vulnerabilities
 
Scenario
George and Brett are friends. Brett is a webadministrator for his company's website. George isa computer geek. He finds security holes in Brett¶s website and claims that he can:Steal identitiesHijack accountsManipulate web pages/inject malicious codesinto the client¶s browserGain access to confidential resourcesBrett challenges this claim maintaining that his Website is secure and free from any intrusion.George thinks that it¶s the time to prove his mettle.
 What next?
Picture Source:http://daz00k.free.fr/geek.gif 
 
Module Objectives
Understanding web application set up
Objectives of web application hacking
 Anatomy of an attack 
 Web application threats
Countermeasures
Tools: Wget, BlackWidow, Window Bomb Websleuth, Burb

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->