Question

In: Computer Science

Provide at least three methods or tools used to attack web servers as well as provide...

  • Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against.

Assignment Objectives:

  1. Identify web application vulnerabilities and tools used to protect web servers.
  2. Discuss securing web applications.
  3. Review the tools used to attack Web servers.

500 words or more, please.

Solutions

Expert Solution

Method1:

Weakness of webserver at the OS level: If webserver is not configured in secured manner Such that If OS is not hardened or uses of well known service port number for web servicing or path for web resource is at default location than it is very dangerous. So an attacker can gues the web resoucerce path or service port number and hacked web servers. And due to unhardened OS an attacker can also take advantage of in order to gain access of web server. Thats why to secure web servers OS should be hardened on which web server is running and also customize the port number or web resource location.

Method2:

Default Credentials: You can place the default user ID's and Passwords assigned to web server running on firewall, wireless access point or even at Physical access also. And Network Administrator not change these credentials lead to web server hacked by attackers. So Network Administrator must should change thases credentials periodically in order to secure the web server.

Method3:

Remote Access: If remote login is not secure means full privilege or remote root user access or weak password lead to web server vulnerabilities. So ensure that you use the strong encryption algorithm, strong password or limited privilege to secure your web server.

Method4:

Unneccessary service can also lead to unauthorized access. So stop the unneccessary service to protect your web server.

MPack: Redirecting all of the website traffic to malicious download websites.

Neosplit: replicate itself

Zeus: Using this an attacker can take controle over computer.


Related Solutions

Provide pricing methods (at least 3) and costing methods(at least 3) that can be used by...
Provide pricing methods (at least 3) and costing methods(at least 3) that can be used by service industries in the event management activities such as annual dinner of the company or training seminar.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Select at least three economic development tools (methods of business attraction, retention, entrepreneurship, etc.) and describe...
Select at least three economic development tools (methods of business attraction, retention, entrepreneurship, etc.) and describe how you would implement them at the state or local level. Why did you select these tools and how would they work together to promote a coherent economic development strategy? Would your tools target a specific stage or types of businesses? What barriers would you face in implementing these methods and how would you overcome those barriers?
Case- IT Auditing Windows servers are used for all server types (application, web and database delivery)....
Case- IT Auditing Windows servers are used for all server types (application, web and database delivery). Windows patch updates comply with the change management policy. Windows patches are downloaded to a central patch server. All patches are reviewed and tested prior to deployment to production servers. All approved patches are first deployed to the development servers, then to the test servers and finally to production servers. Although patches occur on Wednesday evening, if a system reboot is required these are...
Describe three different tools used to collect and analyze kinematic data and three different tools used...
Describe three different tools used to collect and analyze kinematic data and three different tools used to collect and analyze kinetic data and provide the strengths and weaknesses of each tool (6 total; 3 for kinematics and 3 for kinetics). Include both high tech and low tech examples.
Provide a brief review, at least 500 words, on unit hydrograph derivation methods. Acknowledge the used...
Provide a brief review, at least 500 words, on unit hydrograph derivation methods. Acknowledge the used references and provide a list of references.
Provide at least three (3) best practices when creating methods in C# and explain why they...
Provide at least three (3) best practices when creating methods in C# and explain why they are "best.
Problem 4.3.8. In order to guarantee smooth operation, the University has three web- servers. Each can...
Problem 4.3.8. In order to guarantee smooth operation, the University has three web- servers. Each can handle the traffic by itself, and the probability that each is not working on a given day is 10%, independently of the other servers. Assuming that the system is up, what is the probability that only one server is functioning?
network security tool- Nmap • Platform and tools used • Design of experiments (attack/defense) • Preliminary...
network security tool- Nmap • Platform and tools used • Design of experiments (attack/defense) • Preliminary tests • IEEE style report
what is the term used to refer to how salespeople are using web 2.0 tools and...
what is the term used to refer to how salespeople are using web 2.0 tools and social media to sell more effectively?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT