Ethical Hacking: Hacking Web Servers
Pluralsight
Course Summary
Web servers are often the vector through which hackers mount successful online attacks. Understanding the nature of exploitable risks at this level is essential to properly protecting applications from malicious actors. This course looks at a broad range of risks in web server implementations and more importantly, how you can defend against these being compromised by hackers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
Vulnerabilities in web server implementations are frequently the vector by which online attackers compromise systems. The impact can range from short periods of outage, to the total disclosure of sensitive internal information. There are many different levels an attacker may focus their efforts on, including the application, the host operating system, and of course the web server itself. Each has their own weaknesses and each must have the appropriate defenses in place to ensure resiliency from online attacks. In this course, we'll look at various attack vectors in web servers. These include exploiting misconfigured servers, leveraging weaknesses in unpatched environments, compromising weak SSL implementations and much, much more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Understanding How Web Servers Are Hacked- 19m 59s
—Overview 2m 1s
—The Impact of Hacking 4m 16s
—Understanding Web Servers 4m 36s
—Web Servers Versus Web Applications 3m 18s
—The Role of Cloud 3m 21s
—Summary 2m 24sDiscovering Risks in Web Servers- 31m 35s
—Overview 2m 23s
—Crawling, Enumeration, and Directory Traversal 6m 53s
—Mirroring Websites 6m 11s
—Reconnaissance and Footprinting 4m 37s
—HTTP Fingerprinting 4m 36s
—Social Engineering 5m 15s
—Summary 1m 36sWeb Server Misconfiguration- 34m 45sManaging and Hardening Web Servers- 29m 40sOther Attacks Against Web Servers- 29m 31s