Taken from Linux.com ,written by Raymond Ankobia .
This is by no means an exhaustive list but an indication of some serious flaws exploited by hackers. Hacking Exposed: Web Applications (ISBN 007222438X) as a good source for the subject area.
1. Buffer Overflow Attack
2. SQL Injection Attack
3. Cross Site Scripting Attack
4. Input Validation Attack
5. Phishing Attack
6. Mobile code
7. Insecure Configuration Management
8. Google Hacking
:. you can find a full article and download pdf file here
No comments:
Post a Comment