12.1 - Web Servers
12.1 - Web servers
Key Terms:
- Web server – A computer used to store and distribute web pages to clients.
Web Requests
A web server works through requests. First, a client would send a TCP request to the web server to open a connection. Once the handshake has been established, the web server waits as the client sends a HTTP request (URL). Finally, a HTTP response is sent, and the web page is displayed to the client.
Microsoft IIS
Microsoft IIS is a web server application provided by Microsoft to users using Windows. It can support most web hosting protocols such as HTTP, HTTPS, FTP, SMTP, etc... IIS also provides various modules that managers can add such as database support, authentication support, certificate support, security support, process management and protocol listeners.
Apache Web Server
Apache is an open-source web server that provides authentication, SSL support, TLS support, enhanced logging, intrusion detection, HTTP request filtering, and proxy support.
Vulnerabilities
Web servers make great targets for hackers. This is because they are able to provide the hacker with access to the greater network and store lots of sensitive information.
Defacement
This is when a website’s appearance is altered so it looks like it has been defaced to humiliate the business.
Directory Traversal
This is when a hacker targets directories and executable files outside the web server directories. This is only successful on older web servers.
Cross Site Scripting (XSS)
XSS relies on scripting defects on a website. The hacker can inject malicious code into the website via these defects to run trojans on a user’s computer.
Web Hacking Methodology
- Information gathering
- Foot printing
- Mirroring
- Vulnerability scanning
- Hijack sessions
- Crack passwords
Countermeasures
Always remember to verify your configurations as misconfigurations can pose threats. Also patches and updates can fix vulnerabilities, bugs, andimprove performance so updating the web server is vital to security. Make sure all inactive user accounts are removed. Also make sure all default credentials are changed. Disable the directory listing option to defend against directory traversing.
Comments
Post a Comment