Question

In: Computer Science

Provide at least three methods or tools used to attack web servers as well as provide...

  • Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against.

Assignment Objectives:

  1. Identify web application vulnerabilities and tools used to protect web servers.
  2. Discuss securing web applications.
  3. Review the tools used to attack Web servers.

500 words or more, please.

Solutions

Expert Solution

Method1:

Weakness of webserver at the OS level: If webserver is not configured in secured manner Such that If OS is not hardened or uses of well known service port number for web servicing or path for web resource is at default location than it is very dangerous. So an attacker can gues the web resoucerce path or service port number and hacked web servers. And due to unhardened OS an attacker can also take advantage of in order to gain access of web server. Thats why to secure web servers OS should be hardened on which web server is running and also customize the port number or web resource location.

Method2:

Default Credentials: You can place the default user ID's and Passwords assigned to web server running on firewall, wireless access point or even at Physical access also. And Network Administrator not change these credentials lead to web server hacked by attackers. So Network Administrator must should change thases credentials periodically in order to secure the web server.

Method3:

Remote Access: If remote login is not secure means full privilege or remote root user access or weak password lead to web server vulnerabilities. So ensure that you use the strong encryption algorithm, strong password or limited privilege to secure your web server.

Method4:

Unneccessary service can also lead to unauthorized access. So stop the unneccessary service to protect your web server.

MPack: Redirecting all of the website traffic to malicious download websites.

Neosplit: replicate itself

Zeus: Using this an attacker can take controle over computer.


Related Solutions

Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Select at least three economic development tools (methods of business attraction, retention, entrepreneurship, etc.) and describe...
Select at least three economic development tools (methods of business attraction, retention, entrepreneurship, etc.) and describe how you would implement them at the state or local level. Why did you select these tools and how would they work together to promote a coherent economic development strategy? Would your tools target a specific stage or types of businesses? What barriers would you face in implementing these methods and how would you overcome those barriers?
Describe three different tools used to collect and analyze kinematic data and three different tools used...
Describe three different tools used to collect and analyze kinematic data and three different tools used to collect and analyze kinetic data and provide the strengths and weaknesses of each tool (6 total; 3 for kinematics and 3 for kinetics). Include both high tech and low tech examples.
Provide a brief review, at least 500 words, on unit hydrograph derivation methods. Acknowledge the used...
Provide a brief review, at least 500 words, on unit hydrograph derivation methods. Acknowledge the used references and provide a list of references.
Problem 4.3.8. In order to guarantee smooth operation, the University has three web- servers. Each can...
Problem 4.3.8. In order to guarantee smooth operation, the University has three web- servers. Each can handle the traffic by itself, and the probability that each is not working on a given day is 10%, independently of the other servers. Assuming that the system is up, what is the probability that only one server is functioning?
what is the term used to refer to how salespeople are using web 2.0 tools and...
what is the term used to refer to how salespeople are using web 2.0 tools and social media to sell more effectively?
1. Briefly explain how virtualization of Linux Servers may be used in the enterprise to provide...
1. Briefly explain how virtualization of Linux Servers may be used in the enterprise to provide an infrastructure base capable of overcoming component failures. 2.There are different types of firewalls in LINUX. a. What are the key differences between a proxy firewall, state full firewall and packet filter? b. Which would you use if you wanted to do deep inspection of the underlying protocol? 3. A system administrator has been given a new domain foobar.com. Assuming the domain has not...
describe at least two methods used for pricing decisions
describe at least two methods used for pricing decisions
What are the quality management tools and methods that are used in Six Sigma process?
What are the quality management tools and methods that are used in Six Sigma process?
Anonymous Web browsers and other tools to facilitate anonymous communications are used by criminals, legitimate businesses,...
Anonymous Web browsers and other tools to facilitate anonymous communications are used by criminals, legitimate businesses, and law enforcement. Give two reasons each of these groups would use anonymous Web browsing and email
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT