-
Book Overview & Buying
-
Table Of Contents
The Web Application Hacker's Handbook
By :
Many applications are protected by an external component residing either on the same host as the application or on a network-based device. These can be categorized as performing either intrusion prevention (application firewalls) or detection (such as conventional intrusion detection systems). Due to similarities in how these devices identify attacks, we will treat them fairly interchangeably. Although many would argue that having these is better than nothing at all, in many cases they may create a false sense of security in the belief that an extra layer of defense implies an automatic improvement of the defensive posture. Such a system is unlikely to lower the security and may be able to stop a clearly defined attack such as an Internet worm, but in other cases it may not be improving security as much as is sometimes believed.
Immediately it can be noted that unless such defenses employ heavily customized rules, they do not protect against any of the vulnerabilities...
Change the font size
Change margin width
Change background colour