Last week I spoke about SQL injection attacks used to try and gain access to the Administrative Interface on an application sever. This week I will be talking about three other methods used to try and do the same.
Last week I spoke about Session hijacking and methods to secure Authentication details. This week I will be talking about the various types of attacks that are used to try and gain access to the Administrative Interface on the target application server.
Nowadays more and more important data is stored in web applications. These applications expose customer information, financial data and other sensitive and confidential data over the internet. The number of transactions on the web has also increased tremendously. So proper Security Testing of web applications has become a necessity. Over the next few posts, I will be talking about the various types of attacks seen today, and ways to prevent them.