Web Hacking
-
Closer Inspection of a Web Application
Web Application: Web application is designed to run on web servers and send their output over the Internet. Let’s examine…
Read More » -
Terminology in Footprinting
Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking)…
Read More » -
Secure Sockets Layer
Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by…
Read More » -
Reporting a Security Incident
Reporting a Security Incident: Once an incident has been responded to and a team has gotten involved to assess the…
Read More » -
Understanding Certificate Revocation
Understanding Certificate Revocation: Certificate revocation is the process of revoking a certificate before it expires. A certificate may need to…
Read More » -
Certificate Policies
Certificate Policies: Certificate policies define what certificates do. A CA can potentially issue a number of different types of certificate—say,…
Read More » -
Hardening DHCP Services
Hardening DHCP Services: Dynamic Host Configuration Protocol (DHCP) is used in many networks to automate the assignment of IP addresses…
Read More » -
Hardening Web Servers
Hardening Web Servers: Web servers are one of the favorite areas for attackers to exploit because of the reach they…
Read More »