H
hjlbx
Thread author
Good read and videos. Well worth watching each video carefully - once or more.
The 10 Most Common Application Attacks in Action
The application layer is the hardest to defend. The vulnerabilities encountered here often rely on complex user input scenarios that are hard to define with an intrusion detection signature. This layer is also the most accessible and the most exposed to the outside world. For the application to function, it must be accessible over Port 80 (HTTP) or Port 443 (HTTPS).
Sorry, but in most cases there is little the user (client-side) can do in such cases because these attacks are server-side.
The truly scary stuff isn't what you download to your system, but instead a hacked server that you visit and use.
The 10 Most Common Application Attacks in Action
The application layer is the hardest to defend. The vulnerabilities encountered here often rely on complex user input scenarios that are hard to define with an intrusion detection signature. This layer is also the most accessible and the most exposed to the outside world. For the application to function, it must be accessible over Port 80 (HTTP) or Port 443 (HTTPS).
Sorry, but in most cases there is little the user (client-side) can do in such cases because these attacks are server-side.
The truly scary stuff isn't what you download to your system, but instead a hacked server that you visit and use.
Last edited by a moderator: