Web Server As A Target
Web Server As A Target
Web Ripping
Web Ripping is finding and extracting pictures and other media files from specified website URLs and save them to your hard drive. Web Ripping is the ability to copy the structure of a Web site to a local disk and obtain a complete profile of the site and all its files and links.
Google Hacking
As we all know, Google is a Search Engine. Google keeps snapshots of pages it has crawled that we can access via the Cached link on the search results page. Google hacking involves using Advance Search Operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of Vulnerable Web Applications. You can look for the particular Filetypes, Password files and Directories. Even you can find out the IP based CCTV Cameras.
Robot.txt: Example
CrossCross-site scripting
Cross-Site Scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited Cross-Site Scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Recently, vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits. Crosssite scripting was originally referred to as CSS, although this usage has been largely discontinued.
CrossCross-site Scripting
Database Server
The Database server is a key component in a client/server environment. Specially the Websites which have a User Login Architecture. Database Server holds the Database Management System (DBMS) and the Data Records. Upon requests from the client machines, it searches the database for selected records and passes them back over the network. Software to setup a Database Server: Oracle SQL Server MySql
Database Server
SQL injection
A SQL injection attack exploits vulnerabilities in a web server database that allow the attacker to gain access to the database and read, modify, or delete information. An example of a SQL injection attack is making the condition true by giving the identical value to a web page. These values can be inserted into a login as follows: Login: 1' or '1'='1 and Password= 1' or '1'='1 Login: 1' or '1'='1';- When the Username argument is evaluated, 1=1 will assess to TRUE, and an authentic username will be returned.
Proxy Servers
A Proxy Server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control and caching service. Hackers generally use the Proxy server on the Internet to make their Identity invisible to the target.