bob writes, "CGIsecurity.com recently wrote a paper on fingerprinting port80 attacks." These holes can allow an attacker to gain either administrative access to the website, or even the web server itself. This paper looks at some of the signatures . . .
bob writes, "CGIsecurity.com recently wrote a paper on fingerprinting port80 attacks." These holes can allow an attacker to gain either administrative access to the website, or even the web server itself. This paper looks at some of the signatures that are used in these attacks, and what to look for in your logs.