Web Server Security

Last Updated on 6 Sept. 2006, Total: 17 Articles and Tutorials

  1. SPIKE and BURP for real world computer security usage (Part 4)

    In previous articles we covered the SPIKE HTTP proxy, and how to use it. Well there are many different HTTP proxies out there, and the BURP HTTP proxy is one of the better ones. Choosing an HTTP proxy to use is often a matter of preference... Read More

  2. SPIKE and BURP for real world computer security usage (Part 3)

    This article is the last in a series based on SPIKE the HTTP proxy... Read More

  3. SPIKE and BURP for real world computer security usage (Part 2)

    In this part two of the article series we will actually use an HTTP proxy and find out more on how you can use this very useful tool... Read More

  4. SPIKE and BURP for real world computer security usage (Part 1)

    This article series will demonstrate how to use an HTTP proxy... Read More

  5. Protect your Web Servers with SSL

    HTTP communications are fine for the average Web server, which just contains informational pages. But if you’re thinking about running an e-commerce site or other Web services that require secure transactions, you need to be able to encrypt communications between your Web server and its clients. The most common means is by the use of Secure Sockets Layer (SSL), which... Read More

  6. Web Server Defacements (Part 3)

    We shall now actually deface the web server’s web page, and pull off the hack as it were. Furthermore we will peek under the hood, and look at the packets to see just what transpired so that you might recognize it in the future... Read More

  7. Web Server Defacements (Part 2)

    In part two of this article series we shall take a more detailed look at how to actually pull off a web page defacement. The tool in use will be the outstanding open source security program Metasploit Framework. Detailed usage will be shown so you can recreate the scenario... Read More

  8. Web Server Defacements (Part 1)

    The urban art of grafitti has traversed to the online world in the form of web server defacements. Just how do these online vandals do it though? Read on to learn how it is done, and therefore gain a deeper understanding which will help you defend against it... Read More

  9. Web Server Security Issues and Front Page Server Extensions

    It's "common knowledge" (at least in some circles) that FrontPage Server Extensions are insecure and Web Sites created with FrontPage are vulnerable -- but is it true? What are the risks associated with FrontPage and what can you do about them? What are the recommended best practices for securing FP Web sites? In this article, we'll look at Web security... Read More

  10. Using Client Certificate Authentication with IIS 6.0 Web Sites

    In spite of the fact that there’s no such thing as a secure network, there are still a lot of things you can do that doesn’t require you to take a second mortgage on your home and thousands of man-hours. This is especially true when it comes to providing secure access to Microsoft IIS Web servers... Read More